Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ProSheets.msi

Overview

General Information

Sample name:ProSheets.msi
Analysis ID:1430939
MD5:04c1d52cd29d6933bd13a2236633442a
SHA1:303deeac5514427d2e6e10f467c666cd2d8b2a22
SHA256:8a19b38afc3ed60641efcea3be3519fae675b4de583609fb797693514c6ff7a8
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Checks for available system drives (often done to infect USB drives)
Drops PE files
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • msiexec.exe (PID: 7164 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ProSheets.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 6548 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 2492 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding DE2667B8AFF59C1FD16112738283BE86 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 2004 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBBF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5573593 24 SetUpTrackerSelection!SetUpTrackerSelection.CustomActions.SendInstallErrorMsg MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 217.182.69.200:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: Binary string: SetUpTrackerSelection.pdb source: ProSheets.msi, MSIBBF.tmp.0.dr
Source: Binary string: CleanLocalAppDataFolder.pdb source: ProSheets.msi
Source: Binary string: CleanLocalAppDataFolder.pdb source: ProSheets.msi
Source: Binary string: RollBackDllsFolder.pdb source: ProSheets.msi
Source: Binary string: D:\Laboratories\RnD_AdvancedInstaller\AdvIns_Test_4 (NormalIns)\PS\CleanDataCustomAction\SetUpTrackerSelection\obj\x86\Debug\SetUpTrackerSelection.pdb|O source: rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, SetUpTrackerSelection.dll.3.dr
Source: Binary string: SilentInstallationConfig.pdb source: ProSheets.msi
Source: Binary string: SetUpTrackerSelection.pdb source: ProSheets.msi, MSIBBF.tmp.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\ExternalUICleaner.pdb0 source: ProSheets.msi
Source: Binary string: SilentInstallationConfig.pdb source: ProSheets.msi
Source: Binary string: RemovePreviousVersion.pdb source: ProSheets.msi
Source: Binary string: C:\JobRelease\win\Release\custact\x86\ExternalUICleaner.pdb source: ProSheets.msi
Source: Binary string: CleanDataCustomAction.pdb source: ProSheets.msi
Source: Binary string: PrinterSettings.pdb source: ProSheets.msi
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF237.tmp.0.dr
Source: Binary string: D:\Laboratories\RnD_AdvancedInstaller\AdvIns_Test_4 (NormalIns)\PS\CleanDataCustomAction\SetUpTrackerSelection\obj\x86\Debug\SetUpTrackerSelection.pdb source: rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, SetUpTrackerSelection.dll.3.dr
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbP source: rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.dr
Source: Binary string: RemovePreviousVersion.pdb source: ProSheets.msi
Source: Binary string: CleanDataCustomAction.pdb source: ProSheets.msi
Source: Binary string: RollBackDllsFolder.pdb source: ProSheets.msi
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\Prereq.pdbm source: ProSheets.msi, MSIF373.tmp.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\Prereq.pdb source: ProSheets.msi, MSIF373.tmp.0.dr
Source: Binary string: ISETUPT~1.PDBSetUpTrackerSelection.pdbLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTI source: rundll32.exe, 00000003.00000002.1726795884.0000000000B2B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\SfxCA.pdb source: ProSheets.msi, MSIBBF.tmp.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbn source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF237.tmp.0.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\SetUpTrackerSelection.pdbrh8 source: rundll32.exe, 00000003.00000002.1726795884.0000000000B2B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\JobRelease\win\Release\custact\x86\lzmaextractor.pdb source: ProSheets.msi
Source: Binary string: PrinterSettings.pdb source: ProSheets.msi
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 217.182.69.200 443Jump to behavior
Source: global trafficHTTP traffic detected: GET /api/v1/tracker?User=90a4c0a8dc9fe6c0587a2d645e893988&Action=InstallationError&ParentApp=ProSheets&ParentAppVersion=1.2.10.0&App=ProSheets&AppVersion=1.2.10.0&Platform=Revit&PlatformVersion=2021&Description= HTTP/1.1Content-Type: text/xmlAuthorization: nUAJZu_kbGMIcdAdgLySIsBYQ0Q5794aHODddzHqldZwMF0_DggUvCd-ynHCbZaAHost: api.diroots.comConnection: Keep-Alive
Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /api/v1/tracker?User=90a4c0a8dc9fe6c0587a2d645e893988&Action=InstallationError&ParentApp=ProSheets&ParentAppVersion=1.2.10.0&App=ProSheets&AppVersion=1.2.10.0&Platform=Revit&PlatformVersion=2021&Description= HTTP/1.1Content-Type: text/xmlAuthorization: nUAJZu_kbGMIcdAdgLySIsBYQ0Q5794aHODddzHqldZwMF0_DggUvCd-ynHCbZaAHost: api.diroots.comConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: api.diroots.com
Source: rundll32.exe, 00000003.00000002.1727380887.0000000004A10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.diroots.com
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, ProSheets.msi, Microsoft.Deployment.WindowsInstaller.dll.3.dr, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: ProSheets.msiString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, ProSheets.msi, Microsoft.Deployment.WindowsInstaller.dll.3.dr, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: ProSheets.msiString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: ProSheets.msiString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
Source: ProSheets.msiString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, ProSheets.msi, Microsoft.Deployment.WindowsInstaller.dll.3.dr, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
Source: ProSheets.msiString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: ProSheets.msiString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
Source: ProSheets.msiString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, ProSheets.msi, Microsoft.Deployment.WindowsInstaller.dll.3.dr, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, ProSheets.msi, Microsoft.Deployment.WindowsInstaller.dll.3.dr, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
Source: ProSheets.msiString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, ProSheets.msi, Microsoft.Deployment.WindowsInstaller.dll.3.dr, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: ProSheets.msiString found in binary or memory: http://ocsp.digicert.com0A
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, ProSheets.msi, Microsoft.Deployment.WindowsInstaller.dll.3.dr, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drString found in binary or memory: http://ocsp.digicert.com0K
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, ProSheets.msi, Microsoft.Deployment.WindowsInstaller.dll.3.drString found in binary or memory: http://ocsp.digicert.com0N
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, ProSheets.msi, Microsoft.Deployment.WindowsInstaller.dll.3.dr, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://ocsp.digicert.com0O
Source: ProSheets.msiString found in binary or memory: http://ocsp.digicert.com0X
Source: rundll32.exe, 00000003.00000002.1727380887.0000000004981000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1727380887.00000000049EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
Source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://t2.symcb.com0
Source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://tl.symcb.com/tl.crl0
Source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://tl.symcb.com/tl.crt0
Source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://tl.symcd.com0&
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drString found in binary or memory: http://wixtoolset.org
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drString found in binary or memory: http://wixtoolset.org/news/
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drString found in binary or memory: http://wixtoolset.org/releases/
Source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: rundll32.exe, 00000003.00000002.1727380887.00000000049EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.diroot
Source: rundll32.exe, 00000003.00000002.1727380887.0000000004981000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1727380887.00000000049EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.diroots.com
Source: SetUpTrackerSelection.dll.3.drString found in binary or memory: https://api.diroots.com/api/v1/tracker
Source: rundll32.exe, 00000003.00000002.1727380887.0000000004981000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1727380887.00000000049EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.diroots.com/api/v1/tracker?User=90a4c0a8dc9fe6c0587a2d645e893988&Action=InstallationErro
Source: ProSheets.msiString found in binary or memory: https://diroots.com/privacy-policy/
Source: ProSheets.msiString found in binary or memory: https://diroots.com/terms-and-conditions
Source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: https://www.advancedinstaller.com
Source: rundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, ProSheets.msi, Microsoft.Deployment.WindowsInstaller.dll.3.dr, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: https://www.thawte.com/cps0/
Source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drString found in binary or memory: https://www.thawte.com/repository0W
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownHTTPS traffic detected: 217.182.69.200:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: ProSheets.msiBinary or memory string: OriginalFilenamelzmaextractor.dllF vs ProSheets.msi
Source: ProSheets.msiBinary or memory string: OriginalFilenameRollBackDllsFolder.dllF vs ProSheets.msi
Source: ProSheets.msiBinary or memory string: OriginalFilenameSfxCA.dll\ vs ProSheets.msi
Source: ProSheets.msiBinary or memory string: OriginalFilenamePrinterSettings.dll@ vs ProSheets.msi
Source: ProSheets.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs ProSheets.msi
Source: ProSheets.msiBinary or memory string: OriginalFilenamePrereq.dllF vs ProSheets.msi
Source: ProSheets.msiBinary or memory string: OriginalFilenameRemovePreviousVersion.dllL vs ProSheets.msi
Source: ProSheets.msiBinary or memory string: OriginalFilenameExternalUICleaner.dllF vs ProSheets.msi
Source: ProSheets.msiBinary or memory string: OriginalFilenameCleanLocalAppDataFolder.dllP vs ProSheets.msi
Source: ProSheets.msiBinary or memory string: OriginalFilenameSetUpTrackerSelection.dllL vs ProSheets.msi
Source: ProSheets.msiBinary or memory string: OriginalFilenameSilentInstallationConfig.dllR vs ProSheets.msi
Source: ProSheets.msiBinary or memory string: OriginalFilenameCleanDataCustomAction.dllL vs ProSheets.msi
Source: classification engineClassification label: mal48.evad.winMSI@6/12@1/1
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.logJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: NULL
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF237.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBBF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5573593 24 SetUpTrackerSelection!SetUpTrackerSelection.CustomActions.SendInstallErrorMsg
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ProSheets.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding DE2667B8AFF59C1FD16112738283BE86 C
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBBF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5573593 24 SetUpTrackerSelection!SetUpTrackerSelection.CustomActions.SendInstallErrorMsg
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding DE2667B8AFF59C1FD16112738283BE86 CJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBBF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5573593 24 SetUpTrackerSelection!SetUpTrackerSelection.CustomActions.SendInstallErrorMsgJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: ProSheets.msiStatic file information: File size 3558400 > 1048576
Source: Binary string: SetUpTrackerSelection.pdb source: ProSheets.msi, MSIBBF.tmp.0.dr
Source: Binary string: CleanLocalAppDataFolder.pdb source: ProSheets.msi
Source: Binary string: CleanLocalAppDataFolder.pdb source: ProSheets.msi
Source: Binary string: RollBackDllsFolder.pdb source: ProSheets.msi
Source: Binary string: D:\Laboratories\RnD_AdvancedInstaller\AdvIns_Test_4 (NormalIns)\PS\CleanDataCustomAction\SetUpTrackerSelection\obj\x86\Debug\SetUpTrackerSelection.pdb|O source: rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, SetUpTrackerSelection.dll.3.dr
Source: Binary string: SilentInstallationConfig.pdb source: ProSheets.msi
Source: Binary string: SetUpTrackerSelection.pdb source: ProSheets.msi, MSIBBF.tmp.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\ExternalUICleaner.pdb0 source: ProSheets.msi
Source: Binary string: SilentInstallationConfig.pdb source: ProSheets.msi
Source: Binary string: RemovePreviousVersion.pdb source: ProSheets.msi
Source: Binary string: C:\JobRelease\win\Release\custact\x86\ExternalUICleaner.pdb source: ProSheets.msi
Source: Binary string: CleanDataCustomAction.pdb source: ProSheets.msi
Source: Binary string: PrinterSettings.pdb source: ProSheets.msi
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF237.tmp.0.dr
Source: Binary string: D:\Laboratories\RnD_AdvancedInstaller\AdvIns_Test_4 (NormalIns)\PS\CleanDataCustomAction\SetUpTrackerSelection\obj\x86\Debug\SetUpTrackerSelection.pdb source: rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, SetUpTrackerSelection.dll.3.dr
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbP source: rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.dr
Source: Binary string: RemovePreviousVersion.pdb source: ProSheets.msi
Source: Binary string: CleanDataCustomAction.pdb source: ProSheets.msi
Source: Binary string: RollBackDllsFolder.pdb source: ProSheets.msi
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\Prereq.pdbm source: ProSheets.msi, MSIF373.tmp.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\Prereq.pdb source: ProSheets.msi, MSIF373.tmp.0.dr
Source: Binary string: ISETUPT~1.PDBSetUpTrackerSelection.pdbLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTI source: rundll32.exe, 00000003.00000002.1726795884.0000000000B2B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\SfxCA.pdb source: ProSheets.msi, MSIBBF.tmp.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbn source: ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF237.tmp.0.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\SetUpTrackerSelection.pdbrh8 source: rundll32.exe, 00000003.00000002.1726795884.0000000000B2B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\JobRelease\win\Release\custact\x86\lzmaextractor.pdb source: ProSheets.msi
Source: Binary string: PrinterSettings.pdb source: ProSheets.msi
Source: SetUpTrackerSelection.dll.3.drStatic PE information: real checksum: 0x0 should be: 0x75ea
Source: MSIBBF.tmp.0.drStatic PE information: real checksum: 0x32353 should be: 0x49bbb
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_06D01EFB pushfd ; iretd 3_3_06D01F01
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_06D02610 push edi; iretd 3_3_06D02612
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_06D02477 push ebp; iretd 3_3_06D02482
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_06D023A9 push esp; iretd 3_3_06D023AA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_06D023AB push ebx; iretd 3_3_06D023B2
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBBF.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\SetUpTrackerSelection.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF373.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF315.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF237.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF2F4.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF2B5.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIBBF.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\SetUpTrackerSelection.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF373.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF315.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF237.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF2F4.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF2B5.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4176Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: rundll32.exe, 00000003.00000002.1726795884.0000000000B77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 217.182.69.200 443Jump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\SetUpTrackerSelection.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
Windows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account Manager11
Peripheral Device Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS13
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Rundll32
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\MSIBBF.tmp3%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSIF237.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSIF237.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSIF2B5.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSIF2B5.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSIF2F4.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSIF2F4.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSIF315.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSIF315.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSIF373.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSIF373.tmp0%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
api.diroots.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://diroots.com/privacy-policy/0%Avira URL Cloudsafe
https://api.diroots.com/api/v1/tracker?User=90a4c0a8dc9fe6c0587a2d645e893988&Action=InstallationError&ParentApp=ProSheets&ParentAppVersion=1.2.10.0&App=ProSheets&AppVersion=1.2.10.0&Platform=Revit&PlatformVersion=2021&Description=0%Avira URL Cloudsafe
https://diroots.com/terms-and-conditions0%Avira URL Cloudsafe
https://api.diroots.com/api/v1/tracker?User=90a4c0a8dc9fe6c0587a2d645e893988&Action=InstallationErro0%Avira URL Cloudsafe
http://api.diroots.com0%Avira URL Cloudsafe
https://api.diroot0%Avira URL Cloudsafe
https://api.diroots.com/api/v1/tracker0%Avira URL Cloudsafe
https://api.diroots.com0%Avira URL Cloudsafe
https://diroots.com/privacy-policy/0%VirustotalBrowse
http://api.diroots.com0%VirustotalBrowse
https://api.diroots.com0%VirustotalBrowse
https://api.diroots.com/api/v1/tracker0%VirustotalBrowse
https://diroots.com/terms-and-conditions0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
api.diroots.com
217.182.69.200
truetrueunknown
NameMaliciousAntivirus DetectionReputation
https://api.diroots.com/api/v1/tracker?User=90a4c0a8dc9fe6c0587a2d645e893988&Action=InstallationError&ParentApp=ProSheets&ParentAppVersion=1.2.10.0&App=ProSheets&AppVersion=1.2.10.0&Platform=Revit&PlatformVersion=2021&Description=true
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://diroots.com/terms-and-conditionsProSheets.msifalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://wixtoolset.org/releases/rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drfalse
    high
    https://api.diroots.com/api/v1/tracker?User=90a4c0a8dc9fe6c0587a2d645e893988&Action=InstallationErrorundll32.exe, 00000003.00000002.1727380887.0000000004981000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1727380887.00000000049EE000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://api.diroots.comrundll32.exe, 00000003.00000002.1727380887.0000000004A10000.00000004.00000800.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://wixtoolset.orgrundll32.exe, 00000003.00000003.1696793079.00000000047E2000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drfalse
      high
      https://www.thawte.com/cps0/ProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drfalse
        high
        https://diroots.com/privacy-policy/ProSheets.msifalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://www.thawte.com/repository0WProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drfalse
          high
          http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drfalse
            high
            https://www.advancedinstaller.comProSheets.msi, MSIF2F4.tmp.0.dr, MSIF2B5.tmp.0.dr, MSIF315.tmp.0.dr, MSIF373.tmp.0.dr, MSIF237.tmp.0.drfalse
              high
              https://api.dirootrundll32.exe, 00000003.00000002.1727380887.00000000049EE000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://wixtoolset.org/news/rundll32.exe, 00000003.00000003.1696793079.00000000047B4000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.3.drfalse
                high
                https://api.diroots.com/api/v1/trackerSetUpTrackerSelection.dll.3.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerundll32.exe, 00000003.00000002.1727380887.0000000004981000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1727380887.00000000049EE000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://api.diroots.comrundll32.exe, 00000003.00000002.1727380887.0000000004981000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1727380887.00000000049EE000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  217.182.69.200
                  api.diroots.comFrance
                  16276OVHFRtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1430939
                  Start date and time:2024-04-24 12:01:34 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 3s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:8
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:ProSheets.msi
                  Detection:MAL
                  Classification:mal48.evad.winMSI@6/12@1/1
                  EGA Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 48
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .msi
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target rundll32.exe, PID 2004 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.
                  TimeTypeDescription
                  12:02:30API Interceptor1x Sleep call for process: rundll32.exe modified
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  OVHFRbomgar-scc-w0eec30gdg6gx6wy8y6j8ddehxi7i1x5fwfex5jc40jc90.exeGet hashmaliciousUnknownBrowse
                  • 54.38.11.197
                  bomgar-scc-w0eec30gdg6gx6wy8y6j8ddehxi7i1x5fwfex5jc40jc90.exeGet hashmaliciousUnknownBrowse
                  • 54.38.11.197
                  v2cDqXmZtv.elfGet hashmaliciousMiraiBrowse
                  • 51.79.217.59
                  Wd2T9v9ZMT.elfGet hashmaliciousMiraiBrowse
                  • 51.79.217.59
                  7T1vOaCJto.elfGet hashmaliciousMiraiBrowse
                  • 51.79.217.59
                  Price request N#U00b0DEM23000199.jsGet hashmaliciousAsyncRAT, PureLog Stealer, RedLineBrowse
                  • 51.254.27.105
                  SecuriteInfo.com.Python.Stealer.1437.14994.32063.exeGet hashmaliciousPython StealerBrowse
                  • 151.80.29.83
                  SecuriteInfo.com.Win64.TrojanX-gen.22735.27744.exeGet hashmaliciousXmrigBrowse
                  • 54.37.232.103
                  _file____C__Users_hp_Downloads_C__Users_moodyt_AppData_Local_Temp_2_RemittanceAdvice17-Apr-2024.htmlGet hashmaliciousUnknownBrowse
                  • 51.222.241.106
                  Remittance. #U0440df.htmlGet hashmaliciousHTMLPhisherBrowse
                  • 51.222.241.100
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  3b5074b1b5d032e5620f69f9f700ff0eQUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                  • 217.182.69.200
                  DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                  • 217.182.69.200
                  Zapytanie ofertowe Fl#U00e4ktGroup 04232024.htaGet hashmaliciousAgentTesla, GuLoaderBrowse
                  • 217.182.69.200
                  DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                  • 217.182.69.200
                  17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                  • 217.182.69.200
                  Umulighed.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                  • 217.182.69.200
                  load_startup.txt.ps1Get hashmaliciousUnknownBrowse
                  • 217.182.69.200
                  M_F+niestandardowy stempel.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                  • 217.182.69.200
                  https://u44056869.ct.sendgrid.net/ls/click?upn=u001.nH1ryR-2Btr2av-2Bkfc8quLEXKlGRKFonctFf3nB-2FAP-2Bjae3IsQgCoKtK-2FQ57cEEmmhZzRyd07G16kQ6rsc4EaJT6S7Rh48kOVsBPHV-2Fkkk9Vfz7cojLOCLuj4sUGVMM7pbdmwtinmtiLhfYkhEkgve628OiJsccHyeYc3lkmkn6epsOmmj4-2Fi-2BWjxfm73m7vUzCOGnDWnQJBmmd6DmkDcfIw-3D-3DU_vL_MRfqZW9nS4IDBSHT8MfJfSAq9b0aOVvtJoUhpW1Ga8ePAnfV-2FfXwE0xIGnayeXag21qNKRc5VLcgMkPlIuCBf7Hi8EFUvj1-2FlklJpMLZNx1IQq8eO26tVdmeuxhGn-2B2zjA71oEkiC9pTrxX9Dz-2FMJk8mkJr62ye1KlBo-2B8fxBlVl-2B6T0POpB0GKoibGhcjh4Z-2FnPU453nMAkUkNy65MlaA-3D-3DGet hashmaliciousHTMLPhisherBrowse
                  • 217.182.69.200
                  F#U0130YAT TEKL#U0130F.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                  • 217.182.69.200
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\MSIBBF.tmp-\Microsoft.Deployment.WindowsInstaller.dllAdobeAcrobat2.1.2.msiGet hashmaliciousAteraAgentBrowse
                    440e4d.msiGet hashmaliciousAteraAgentBrowse
                      OPSWAT NetWall OSI-Pi Service (Blue).msiGet hashmaliciousUnknownBrowse
                        OPSWAT_OPCDA_RED_Service.msiGet hashmaliciousUnknownBrowse
                          digitalform.msiGet hashmaliciousAteraAgentBrowse
                            OPSWAT NetWall OSI-Pi Service (Red).msiGet hashmaliciousUnknownBrowse
                              OPSWAT NetWall OSI-Pi Service (Red).msiGet hashmaliciousUnknownBrowse
                                Salary.msiGet hashmaliciousAteraAgentBrowse
                                  MSIx64.msiGet hashmaliciousUnknownBrowse
                                    MSIx64.msiGet hashmaliciousUnknownBrowse
                                      C:\Users\user\AppData\Local\Temp\MSIF237.tmpStep 3 - Setup_Install_Game.exeGet hashmaliciousXmrigBrowse
                                        VMBHNCF{68111D07-1E25-4791-835A-CA847E8E5AA0}#U00aevnfc.msiGet hashmaliciousUnknownBrowse
                                          VIRCFO-{ABC4DB18-37AD-4243-A6FD-D54436354C9E}#U00aexrtkjl.msiGet hashmaliciousUnknownBrowse
                                            Step 3 - Setup_Install_Game.exeGet hashmaliciousXmrigBrowse
                                              Step 3 - Setup_Install_Game.exeGet hashmaliciousUnknownBrowse
                                                huorong.exeGet hashmaliciousUnknownBrowse
                                                  huorong.exeGet hashmaliciousUnknownBrowse
                                                    Tenorshare UltData for iOS 9.4.14.6 Multilingual.zipGet hashmaliciousUnknownBrowse
                                                      Sgnd_NF-esViaClientDofXrtx_#UfffdANXRTS.msiGet hashmaliciousUnknownBrowse
                                                        Seg.ViaimpressoemAnexo#U00aeXLSBLTR.msiGet hashmaliciousUnknownBrowse
                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                          File Type:CSV text
                                                          Category:dropped
                                                          Size (bytes):847
                                                          Entropy (8bit):5.345615485833535
                                                          Encrypted:false
                                                          SSDEEP:24:ML9E4KlKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKlYHKh3oPtHo6hAHKzeR
                                                          MD5:EEEC189088CC5F1F69CEE62A3BE59EA2
                                                          SHA1:250F25CE24458FC0C581FDDF59FAA26D557844C5
                                                          SHA-256:5345D03A7E6C9436497BA4120DE1F941800F2522A21DE70CEA6DB1633D356E11
                                                          SHA-512:2E017FD29A505BCAC78C659DE10E0D869C42CE3B057840680B23961DBCB1F82B1CC7094C87CEEB8FA14826C4D8CFED88DC647422A4A3FA36C4AAFD6430DAEFE5
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..
                                                          Process:C:\Windows\System32\msiexec.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):198
                                                          Entropy (8bit):3.3949497762780183
                                                          Encrypted:false
                                                          SSDEEP:3:QxtP6nElClDg+OjmlH/wlRlX+PpJlmnmf2KXMFS+lNLlFl83fPlXlNWlVlwlYl1:QOnElClDHOjSfwRmlv2K8c+a3UlPwlYH
                                                          MD5:818647D9C14E7CE44FED4531D2F02DB8
                                                          SHA1:807387F631FD888511C5F56D0908CDAAA916E45E
                                                          SHA-256:C8133442ED4F9DE725F1C08F54D35A8FA98A72B10B1EB107D6721EF5404AE997
                                                          SHA-512:952BC9EF9431C26D24FF7E3249148ADEF83B3E95A18EEDB579C3B3CAE9E845342641014410F7BB38DDD6312A2B1306B60DFD28A69C4ACC215C0BC11E5CCD8CBB
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:..T.h.i.s. .p.a.c.k.a.g.e. .c.a.n. .o.n.l.y. .b.e. .r.u.n. .f.r.o.m. .a. .b.o.o.t.s.t.r.a.p.p.e.r.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.4./.0.4./.2.0.2.4. . .1.2.:.0.2.:.3.0. .=.=.=.....
                                                          Process:C:\Windows\System32\msiexec.exe
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                          Category:dropped
                                                          Size (bytes):261842
                                                          Entropy (8bit):6.312124413073159
                                                          Encrypted:false
                                                          SSDEEP:3072:RArbg5BxgracGnEnRQOl9WGPot4fQx9uYoiRUXXM8Q2KcDa283IKCrKl+E8S2:RArbtraBqLlAGwF6XPOcufC2lqS2
                                                          MD5:4B3F6805C572F1427704FDB3B2B73612
                                                          SHA1:F0B29EF3255A4EEC5CD0F7A8055BAA4C0406681C
                                                          SHA-256:12D3F60DAEB73B707BE8FF23BA234B096995640A11EAAC9CC992D206903B4CC6
                                                          SHA-512:B4B84A97C87BC4F4D7B6B5683036F48A321952F9AC8497C15A2CE129CA14C10773A5AAC64FB5F8E00140A86E58CAB771284C1F2C9CF71892E78DFB2C17149B64
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................'P\....'P^....'P_...........................>.......4..................R......:...........Rich...........................PE..L....o.]...........!.....D...|.......L.......`......................................S#....@.........................0}...*......x.......$.......................4... s..T...........................xs..@............`..l............................text....B.......D.................. ..`.rdata...Q...`...R...H..............@..@.data...p...........................@....rsrc...$...........................@..@.reloc..4...........................@..B................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                          File Type:XML 1.0 document, ASCII text
                                                          Category:dropped
                                                          Size (bytes):1461
                                                          Entropy (8bit):4.6832580781878015
                                                          Encrypted:false
                                                          SSDEEP:24:2dRNmho2sPY6Ide7LzK6GAcWvlThl7j+ZiNr8GwjDhi:cOC2V5Q7XwWvFD7dr8GwM
                                                          MD5:8C22D283225F3BDB8E36522C359796F9
                                                          SHA1:CEC5168B62BC7D39930E0843A0A285C3D89ED23E
                                                          SHA-256:5D6FD5049F33AC6B16EC0431787FA61C66630BA1916BB4C70F3F6B5844B74ECB
                                                          SHA-512:826550987A6140B870894C02C20F1C890E187C5919FC60F5FE3FE962FC87BFCC3879EE1DE6141D679AA85F6CF52F8BE88A9B23A8D43B8561B6B70BAF138ADA3E
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:<?xml version="1.0" encoding="utf-8" ?>.<configuration>. <startup useLegacyV2RuntimeActivationPolicy="true">.. . Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that. the custom action should run on. If no versions are specified, the chosen version of the runtime. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify. only the version(s) of the .NET Framework runtime that you have tested against... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies. by using the latest supported runti
                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):184240
                                                          Entropy (8bit):5.876033362692288
                                                          Encrypted:false
                                                          SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                          MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                          SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                          SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                          SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Joe Sandbox View:
                                                          • Filename: AdobeAcrobat2.1.2.msi, Detection: malicious, Browse
                                                          • Filename: 440e4d.msi, Detection: malicious, Browse
                                                          • Filename: OPSWAT NetWall OSI-Pi Service (Blue).msi, Detection: malicious, Browse
                                                          • Filename: OPSWAT_OPCDA_RED_Service.msi, Detection: malicious, Browse
                                                          • Filename: digitalform.msi, Detection: malicious, Browse
                                                          • Filename: OPSWAT NetWall OSI-Pi Service (Red).msi, Detection: malicious, Browse
                                                          • Filename: OPSWAT NetWall OSI-Pi Service (Red).msi, Detection: malicious, Browse
                                                          • Filename: Salary.msi, Detection: malicious, Browse
                                                          • Filename: MSIx64.msi, Detection: malicious, Browse
                                                          • Filename: MSIx64.msi, Detection: malicious, Browse
                                                          Reputation:moderate, very likely benign file
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):14336
                                                          Entropy (8bit):5.223720598514532
                                                          Encrypted:false
                                                          SSDEEP:384:f7kjVmfYHnFOFnXarS4D7TqZ05sADcMnDDMfZOeg:6HKqrRTG0GADcMnDDMfZZ
                                                          MD5:8491FE819E742D1BB6D2A35ECB1685E4
                                                          SHA1:57EB8B366AD453A273A469C254D6756DEC9E3F02
                                                          SHA-256:CB5CC106911058BF7BA78B6B82162E328DDF212C970FA4F9F36D0657D3162A00
                                                          SHA-512:7878A89E7BB0D1FA300338720202977E1963AA58AFC402BCF46E67907D39DD9A1217AEB2144D3021C13C8157A97E0FB5BC3C6E36ED817FEAF8F4D34D7A6BCD6D
                                                          Malicious:false
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Eb.........." ..0..0...........O... ...`....... ....................................`.................................TO..O....`...............................N............................................... ............... ..H............text..../... ...0.................. ..`.rsrc........`.......2..............@..@.reloc...............6..............@..B.................O......H........+..H"...........................................................0............(.....(.....o.......+..*...0...........(.....o......(.......+..*...0..%.........r...pr...po....r...pr...po.....+..*....0..%.........r...pr...po....r...pr...po.....+..*".(.....*...0..k.........r...po......r7..po....rS..p(....-.r[..p+.rg..p..rq..po.....r...p..#(.....(......(........9.......(........(........9.......(........o ...(...+.o".......o ...~....%-.&~......*...s#...%.....(...+.........
                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                          File Type:MSVC program database ver 7.00, 512*91 bytes
                                                          Category:dropped
                                                          Size (bytes):46592
                                                          Entropy (8bit):3.5614750043895826
                                                          Encrypted:false
                                                          SSDEEP:768:MsXN+ZAaqHnaRaJwb22LIffG8mwhma7KrT9haHLNb+6H0YP/sjw7:fua7mTyH
                                                          MD5:C92DAEB2AA1A0CE088773B9477811ED8
                                                          SHA1:18678BF484FD4BCACA19A819633CE92C47273D61
                                                          SHA-256:657C075FA9B3E07658F34F4601F251D1DB28A436382B798F99EEA50FEDF55CED
                                                          SHA-512:17FEF803B4FD38885EFE53BDCBA9D1EF591769847BB648155D4D09BAD2F31BDFAB770B7D3CE19D5598F24BC966B0C78D0DBD93989561955A20E032EA61715B83
                                                          Malicious:false
                                                          Preview:Microsoft C/C++ MSF 7.00...DS...........[...........X...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\msiexec.exe
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):446944
                                                          Entropy (8bit):6.4046361691542355
                                                          Encrypted:false
                                                          SSDEEP:6144:nLqkVr003gT0stWobv9lQK0T4JGufLIe3HP3LAOu3HjKkMeaZeOJp:LqS0Yg3v9lQK5zRL83PM/ZX
                                                          MD5:5788EFA607D26332D6D7F5E6A1F6BD6F
                                                          SHA1:E7749843CC3E89BC81649087DE4AD44C93D48BC6
                                                          SHA-256:9FC2608C9E5EF5A88DD91C82660FA297144BA6BBF4602140D638DE7233A4625D
                                                          SHA-512:CE472CA4F956DA4160CFD9B9051455974E24DD8B23A0B7B197AFD1F7552E37980809E523BEDC0D4C2F4C9CB6EF300B221E6404E6E6A1B789B67756550DDD2104
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Joe Sandbox View:
                                                          • Filename: Step 3 - Setup_Install_Game.exe, Detection: malicious, Browse
                                                          • Filename: VMBHNCF{68111D07-1E25-4791-835A-CA847E8E5AA0}#U00aevnfc.msi, Detection: malicious, Browse
                                                          • Filename: VIRCFO-{ABC4DB18-37AD-4243-A6FD-D54436354C9E}#U00aexrtkjl.msi, Detection: malicious, Browse
                                                          • Filename: Step 3 - Setup_Install_Game.exe, Detection: malicious, Browse
                                                          • Filename: Step 3 - Setup_Install_Game.exe, Detection: malicious, Browse
                                                          • Filename: huorong.exe, Detection: malicious, Browse
                                                          • Filename: huorong.exe, Detection: malicious, Browse
                                                          • Filename: Tenorshare UltData for iOS 9.4.14.6 Multilingual.zip, Detection: malicious, Browse
                                                          • Filename: Sgnd_NF-esViaClientDofXrtx_#UfffdANXRTS.msi, Detection: malicious, Browse
                                                          • Filename: Seg.ViaimpressoemAnexo#U00aeXLSBLTR.msi, Detection: malicious, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........0...c...c...c$..b...c$..bP..c...b...c...b...c...b...c$..b...c$..b...c$..b...c...c...cM..b...cM..b...cM.3c...c..[c...cM..b...cRich...c................PE..L....v.a.........."!.....t...P......v...............................................}L....@.........................PK......$S..........0........................L......p...............................@...............4............................text...6s.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\msiexec.exe
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):446944
                                                          Entropy (8bit):6.4046361691542355
                                                          Encrypted:false
                                                          SSDEEP:6144:nLqkVr003gT0stWobv9lQK0T4JGufLIe3HP3LAOu3HjKkMeaZeOJp:LqS0Yg3v9lQK5zRL83PM/ZX
                                                          MD5:5788EFA607D26332D6D7F5E6A1F6BD6F
                                                          SHA1:E7749843CC3E89BC81649087DE4AD44C93D48BC6
                                                          SHA-256:9FC2608C9E5EF5A88DD91C82660FA297144BA6BBF4602140D638DE7233A4625D
                                                          SHA-512:CE472CA4F956DA4160CFD9B9051455974E24DD8B23A0B7B197AFD1F7552E37980809E523BEDC0D4C2F4C9CB6EF300B221E6404E6E6A1B789B67756550DDD2104
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........0...c...c...c$..b...c$..bP..c...b...c...b...c...b...c$..b...c$..b...c$..b...c...c...cM..b...cM..b...cM.3c...c..[c...cM..b...cRich...c................PE..L....v.a.........."!.....t...P......v...............................................}L....@.........................PK......$S..........0........................L......p...............................@...............4............................text...6s.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\msiexec.exe
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):446944
                                                          Entropy (8bit):6.4046361691542355
                                                          Encrypted:false
                                                          SSDEEP:6144:nLqkVr003gT0stWobv9lQK0T4JGufLIe3HP3LAOu3HjKkMeaZeOJp:LqS0Yg3v9lQK5zRL83PM/ZX
                                                          MD5:5788EFA607D26332D6D7F5E6A1F6BD6F
                                                          SHA1:E7749843CC3E89BC81649087DE4AD44C93D48BC6
                                                          SHA-256:9FC2608C9E5EF5A88DD91C82660FA297144BA6BBF4602140D638DE7233A4625D
                                                          SHA-512:CE472CA4F956DA4160CFD9B9051455974E24DD8B23A0B7B197AFD1F7552E37980809E523BEDC0D4C2F4C9CB6EF300B221E6404E6E6A1B789B67756550DDD2104
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........0...c...c...c$..b...c$..bP..c...b...c...b...c...b...c$..b...c$..b...c$..b...c...c...cM..b...cM..b...cM.3c...c..[c...cM..b...cRich...c................PE..L....v.a.........."!.....t...P......v...............................................}L....@.........................PK......$S..........0........................L......p...............................@...............4............................text...6s.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\msiexec.exe
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):446944
                                                          Entropy (8bit):6.4046361691542355
                                                          Encrypted:false
                                                          SSDEEP:6144:nLqkVr003gT0stWobv9lQK0T4JGufLIe3HP3LAOu3HjKkMeaZeOJp:LqS0Yg3v9lQK5zRL83PM/ZX
                                                          MD5:5788EFA607D26332D6D7F5E6A1F6BD6F
                                                          SHA1:E7749843CC3E89BC81649087DE4AD44C93D48BC6
                                                          SHA-256:9FC2608C9E5EF5A88DD91C82660FA297144BA6BBF4602140D638DE7233A4625D
                                                          SHA-512:CE472CA4F956DA4160CFD9B9051455974E24DD8B23A0B7B197AFD1F7552E37980809E523BEDC0D4C2F4C9CB6EF300B221E6404E6E6A1B789B67756550DDD2104
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........0...c...c...c$..b...c$..bP..c...b...c...b...c...b...c$..b...c$..b...c$..b...c...c...cM..b...cM..b...cM.3c...c..[c...cM..b...cRich...c................PE..L....v.a.........."!.....t...P......v...............................................}L....@.........................PK......$S..........0........................L......p...............................@...............4............................text...6s.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\msiexec.exe
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):589280
                                                          Entropy (8bit):6.442916052553395
                                                          Encrypted:false
                                                          SSDEEP:12288:GTZWopAhAszJd6r1rikyf7yHJ7TKQ7liv2WOSCtEo5eYSQZOjX0N:LopA/ZQ7TK2ivxdfYVZOjX0N
                                                          MD5:8C1A778E0754301C97A660DBF3E8303B
                                                          SHA1:F489C45CDE796DE0D23EE862948F5E50379DEE60
                                                          SHA-256:000B773A448B107CBF3268FEA3A0EEC388DAA71C5F911979C5D21F0CD8D6DA54
                                                          SHA-512:010E76ED659F73CC263CE9B2D2635D775B296C10E53BA133FBA6AACDE02ED409B19F4C4E2BA6DF7730DDC8669C818E99773F25854A1916CCF8ACF9E459482FEA
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......?.~.{..@{..@{..@...Av..@...A..@)..Aj..@)..Al..@...Ab..@)..A/..@...Az..@...Al..@{..@?..@...A=..@...Az..@...@z..@{..@z..@...Az..@Rich{..@........................PE..L..._w.a.........."!.....f.......... K....................................... ......|t....@..........................w.......x..........h........................X......p...........................h...@...................|u..@....................text....e.......f.................. ..`.rdata...............j..............@..@.data................v..............@....rsrc...h...........................@..@.reloc...X.......Z..................@..B........................................................................................................................................................................................................................................................................
                                                          File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {F6295B92-0736-49E6-B20A-DDD980CE5611}, Number of Words: 2, Subject: ProSheets, Author: DiRoots Ltd., Name of Creating Application: ProSheets, Template: ;1033, Comments: This installer database contains the logic and data required to install ProSheets., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                                          Entropy (8bit):6.446403369935835
                                                          TrID:
                                                          • Windows SDK Setup Transform Script (63028/2) 47.91%
                                                          • Microsoft Windows Installer (60509/1) 46.00%
                                                          • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                                          File name:ProSheets.msi
                                                          File size:3'558'400 bytes
                                                          MD5:04c1d52cd29d6933bd13a2236633442a
                                                          SHA1:303deeac5514427d2e6e10f467c666cd2d8b2a22
                                                          SHA256:8a19b38afc3ed60641efcea3be3519fae675b4de583609fb797693514c6ff7a8
                                                          SHA512:1c090166ad43d4ba6ab6b9bc5839539c49b5b9fcf3f17f1c25d98b5b5e196ea28c3caf7d96c2b25898aa573a8a03f930dec03e05457ccb15b43ab40636404fe7
                                                          SSDEEP:49152:ci2lXpoL1BFhv8RRYGZX3si3QVZOjX0N/oT5xrVi4GubXQ+L1TOYbk:gDo7b0RGFiuo/xiduTQ+L1TOYb
                                                          TLSH:DCF59C107299C436E5BE0A302928D66A597E7EB04B7184DFA3C87A2EDEF05C05735F63
                                                          File Content Preview:........................>...................7...........................................l.......T...............................................................W...X...Y...Z...[...\...]...^..._...............................8...9...:...;...)...*...+...,..
                                                          Icon Hash:2d2e3797b32b2b99
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 24, 2024 12:02:28.680051088 CEST49731443192.168.2.4217.182.69.200
                                                          Apr 24, 2024 12:02:28.680147886 CEST44349731217.182.69.200192.168.2.4
                                                          Apr 24, 2024 12:02:28.680231094 CEST49731443192.168.2.4217.182.69.200
                                                          Apr 24, 2024 12:02:28.698081970 CEST49731443192.168.2.4217.182.69.200
                                                          Apr 24, 2024 12:02:28.698116064 CEST44349731217.182.69.200192.168.2.4
                                                          Apr 24, 2024 12:02:29.342179060 CEST44349731217.182.69.200192.168.2.4
                                                          Apr 24, 2024 12:02:29.342315912 CEST49731443192.168.2.4217.182.69.200
                                                          Apr 24, 2024 12:02:29.344805956 CEST49731443192.168.2.4217.182.69.200
                                                          Apr 24, 2024 12:02:29.344831944 CEST44349731217.182.69.200192.168.2.4
                                                          Apr 24, 2024 12:02:29.345052004 CEST44349731217.182.69.200192.168.2.4
                                                          Apr 24, 2024 12:02:29.386400938 CEST49731443192.168.2.4217.182.69.200
                                                          Apr 24, 2024 12:02:29.389257908 CEST49731443192.168.2.4217.182.69.200
                                                          Apr 24, 2024 12:02:29.432198048 CEST44349731217.182.69.200192.168.2.4
                                                          Apr 24, 2024 12:02:31.181794882 CEST44349731217.182.69.200192.168.2.4
                                                          Apr 24, 2024 12:02:31.181852102 CEST44349731217.182.69.200192.168.2.4
                                                          Apr 24, 2024 12:02:31.182087898 CEST49731443192.168.2.4217.182.69.200
                                                          Apr 24, 2024 12:02:31.193017960 CEST49731443192.168.2.4217.182.69.200
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 24, 2024 12:02:28.426749945 CEST5787353192.168.2.41.1.1.1
                                                          Apr 24, 2024 12:02:28.662619114 CEST53578731.1.1.1192.168.2.4
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Apr 24, 2024 12:02:28.426749945 CEST192.168.2.41.1.1.10x4a8dStandard query (0)api.diroots.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Apr 24, 2024 12:02:28.662619114 CEST1.1.1.1192.168.2.40x4a8dNo error (0)api.diroots.com217.182.69.200A (IP address)IN (0x0001)false
                                                          • api.diroots.com
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.449731217.182.69.2004432004C:\Windows\SysWOW64\rundll32.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-04-24 10:02:29 UTC376OUTGET /api/v1/tracker?User=90a4c0a8dc9fe6c0587a2d645e893988&Action=InstallationError&ParentApp=ProSheets&ParentAppVersion=1.2.10.0&App=ProSheets&AppVersion=1.2.10.0&Platform=Revit&PlatformVersion=2021&Description= HTTP/1.1
                                                          Content-Type: text/xml
                                                          Authorization: nUAJZu_kbGMIcdAdgLySIsBYQ0Q5794aHODddzHqldZwMF0_DggUvCd-ynHCbZaA
                                                          Host: api.diroots.com
                                                          Connection: Keep-Alive
                                                          2024-04-24 10:02:31 UTC184INHTTP/1.1 200 OK
                                                          Date: Wed, 24 Apr 2024 10:02:31 GMT
                                                          Server: Kestrel
                                                          Content-Type: text/plain; charset=utf-8
                                                          Vary: Accept-Encoding
                                                          Connection: close
                                                          Transfer-Encoding: chunked
                                                          2024-04-24 10:02:31 UTC17INData Raw: 37 0d 0a 53 75 63 63 65 73 73 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 7Success0


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:12:02:20
                                                          Start date:24/04/2024
                                                          Path:C:\Windows\System32\msiexec.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ProSheets.msi"
                                                          Imagebase:0x7ff74c790000
                                                          File size:69'632 bytes
                                                          MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:12:02:20
                                                          Start date:24/04/2024
                                                          Path:C:\Windows\System32\msiexec.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\msiexec.exe /V
                                                          Imagebase:0x7ff74c790000
                                                          File size:69'632 bytes
                                                          MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:2
                                                          Start time:12:02:20
                                                          Start date:24/04/2024
                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding DE2667B8AFF59C1FD16112738283BE86 C
                                                          Imagebase:0x420000
                                                          File size:59'904 bytes
                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:12:02:27
                                                          Start date:24/04/2024
                                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBBF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5573593 24 SetUpTrackerSelection!SetUpTrackerSelection.CustomActions.SendInstallErrorMsg
                                                          Imagebase:0xdf0000
                                                          File size:61'440 bytes
                                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q
                                                            • API String ID: 0-355816377
                                                            • Opcode ID: 45a576d2906ead111c50784441ed86bda4a63f91040a7dc72de2fa501e6b569d
                                                            • Instruction ID: dea6c9a932f27e761bec97e56f29f117c647db1c3aa27ca0e00e5c5e3cdd9d89
                                                            • Opcode Fuzzy Hash: 45a576d2906ead111c50784441ed86bda4a63f91040a7dc72de2fa501e6b569d
                                                            • Instruction Fuzzy Hash: 8D51B131B002099FD7559FB8DC506AEBBF6FFC9350B14812AE814DB3A4DA309D42C7A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (bq$LR^q
                                                            • API String ID: 0-516514815
                                                            • Opcode ID: 415c534bdf8c76fdde5753050f5b7fb113b622793f867b714bd5e6b72a0a3250
                                                            • Instruction ID: 594f379b7cd8a9518a91da5c0872a34ee71a0e043b637d9bbbd0e8d77a323096
                                                            • Opcode Fuzzy Hash: 415c534bdf8c76fdde5753050f5b7fb113b622793f867b714bd5e6b72a0a3250
                                                            • Instruction Fuzzy Hash: 9B31FE31B052554FEB889B39886873F3AEBEBC5310F548469E506CB2D5EE38DA018795
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (bq
                                                            • API String ID: 0-149360118
                                                            • Opcode ID: 0eb63029011450a233e759d82790167a17e21d2bbe7f5513d999fae593a780d5
                                                            • Instruction ID: 3c19d872361eac1b4e0223250e5d8c1dbf86d802e2f7a0889c550c8e8f08573b
                                                            • Opcode Fuzzy Hash: 0eb63029011450a233e759d82790167a17e21d2bbe7f5513d999fae593a780d5
                                                            • Instruction Fuzzy Hash: 8471B331F002149FEB489BB9CC5476EBAE7EFC8310F148429E506AB3A4DE35DD528791
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR^q
                                                            • API String ID: 0-2625958711
                                                            • Opcode ID: a488996288ec3fad8433506f3bffd722f9194bee2898041ceb3d47ed06c58f82
                                                            • Instruction ID: e041fbdb6b0ceeb8be93b982a20fa80fef1d2192f08efb68385f9bc938c7ff77
                                                            • Opcode Fuzzy Hash: a488996288ec3fad8433506f3bffd722f9194bee2898041ceb3d47ed06c58f82
                                                            • Instruction Fuzzy Hash: 07518F74E012198FDB04CFAAD584AEEBBF2FF88310F14916AE815A7354DB349945CF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR^q
                                                            • API String ID: 0-2625958711
                                                            • Opcode ID: 174f2a53505b1725f5d5a7d16eabf56b8362755467e2d0303c0e84ff027982bf
                                                            • Instruction ID: 4742cfb76c893c014a9067c827204db9adfc9062d2521ff22afa59e984470321
                                                            • Opcode Fuzzy Hash: 174f2a53505b1725f5d5a7d16eabf56b8362755467e2d0303c0e84ff027982bf
                                                            • Instruction Fuzzy Hash: 0321CC31B121155FEB88DB299C58B7F36EBEBC4710F50442DE50AC72D4EF349A0087A4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (bq
                                                            • API String ID: 0-149360118
                                                            • Opcode ID: 6826993bfb6d653abe93ec778c510431830920d22a805faa76c3226a0e797d13
                                                            • Instruction ID: b65e8abb300280b4ba384bd0965105431893f80efda4dcdb4cb7d1ab70a6f881
                                                            • Opcode Fuzzy Hash: 6826993bfb6d653abe93ec778c510431830920d22a805faa76c3226a0e797d13
                                                            • Instruction Fuzzy Hash: E411AC21B04115ABE788ABA888643AE7AE6DBC9310F24846DD506F73C5CE759E0587E1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9db5de63c37bda9b1c1ad43a24486f4de9e602f0fbd80204e522c9ab95d11d72
                                                            • Instruction ID: b33d32e6f17534d148fbdcbec776727ff113405136250bf6e70794f8132daf63
                                                            • Opcode Fuzzy Hash: 9db5de63c37bda9b1c1ad43a24486f4de9e602f0fbd80204e522c9ab95d11d72
                                                            • Instruction Fuzzy Hash: 80B17274E00219CFDB54DFA9C998B9DBBB1BF49304F2180A9E409AB365DB34AD85CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 22d657d2bd79ccbcfbe0e0fc65f76e6055107bac5e9b506fdbf14be8ed604a3c
                                                            • Instruction ID: a3e1dc7af2f21afa284dba49cf94a6f2a3b1ccdfc599db01201270e27944fc43
                                                            • Opcode Fuzzy Hash: 22d657d2bd79ccbcfbe0e0fc65f76e6055107bac5e9b506fdbf14be8ed604a3c
                                                            • Instruction Fuzzy Hash: 5BB16074E00218CFDB54DFA9D998A9DBBB2BF49314F1180A9E409AB361DB34AD85CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 50cf42250635baeb92f8d1a2fd575fd95217f7c51af8dac024c0b65e2ba889ce
                                                            • Instruction ID: 00702748e414cff4149d86e9a3424a38a86b97a448c2234f828ad8c50b7fcb82
                                                            • Opcode Fuzzy Hash: 50cf42250635baeb92f8d1a2fd575fd95217f7c51af8dac024c0b65e2ba889ce
                                                            • Instruction Fuzzy Hash: FA61B878A00208DFDB05DFA4D654A9DBBB7FF88310F108429E805773A4CB36AD96DB55
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 31ffb52196aa7aa6eb8506d65f50f8598c133eda57e48901659f12dd948d7273
                                                            • Instruction ID: 4b5eda7066f32f4ed53c3466c62b50f660a8361564f850836fe770625ff3f374
                                                            • Opcode Fuzzy Hash: 31ffb52196aa7aa6eb8506d65f50f8598c133eda57e48901659f12dd948d7273
                                                            • Instruction Fuzzy Hash: CD617778A00208DFDB05DFA4D654A9DBBB7FF88310F208429E805773A4CB36AD96DB55
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0364267f05c90ef83bc4a5cbca89314c7db6bfd1c300ef9595b69454a8e56c13
                                                            • Instruction ID: 3412e00851436af2e1dc9ec25c6f12b6692e51e92c396fd7049e0268510883a7
                                                            • Opcode Fuzzy Hash: 0364267f05c90ef83bc4a5cbca89314c7db6bfd1c300ef9595b69454a8e56c13
                                                            • Instruction Fuzzy Hash: 8E51AF78E05209DFDB44CFA9D584AADBBF2FF49310F119069E815AB360DB34A981CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 91a52d00fd21c1434d42794cfd1b7b0607c123afcdb8e20146e11e06e89d360e
                                                            • Instruction ID: f6348dee15e07a8766910fb719a0b2b8a1be6ed544686aeb4615fade1eae2627
                                                            • Opcode Fuzzy Hash: 91a52d00fd21c1434d42794cfd1b7b0607c123afcdb8e20146e11e06e89d360e
                                                            • Instruction Fuzzy Hash: A351E374E052099FDB44CFA9D984AEEBBB6FF89310F10806AE915A7360DB345D41CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 01a0765386442fddccb53f2032e7fe748fea905eb56207d16ca0a5eec58da359
                                                            • Instruction ID: e2d79ed3ad8ef97ad7742712415fce074b7d6001fb5957c99aa8d5e6262a1798
                                                            • Opcode Fuzzy Hash: 01a0765386442fddccb53f2032e7fe748fea905eb56207d16ca0a5eec58da359
                                                            • Instruction Fuzzy Hash: 94411C35B101149FDB54DF68D884A9EBBB6FF8D710B10816AE905EB360DB31DD42CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a0d4ebb6d277c451cb74111f88fe23a97a8d260f70b85fafc43c1d16e7ca0c76
                                                            • Instruction ID: a380344a3e92775989e0c34684c7352c2ee1fc9c85de90cb4e34df837cb64de8
                                                            • Opcode Fuzzy Hash: a0d4ebb6d277c451cb74111f88fe23a97a8d260f70b85fafc43c1d16e7ca0c76
                                                            • Instruction Fuzzy Hash: 5D41E074E05258AFDF44CFEAD844AEDBFF6EB49350F04802AE858AB250DB349A41CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7ae3686487b00404733edc46a1f93928dc691b456c17693bef527e5f0b70b6d9
                                                            • Instruction ID: a47e82a9d2039600af15b327f424b61cbfa92aa525d8e5f0ee93277b71b22693
                                                            • Opcode Fuzzy Hash: 7ae3686487b00404733edc46a1f93928dc691b456c17693bef527e5f0b70b6d9
                                                            • Instruction Fuzzy Hash: 3241E074E052589FDF44CFE6D848AEDBFF6EB49350F14802AE858AB290D7349A41CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 68ab6e620c1d441cfc297d121b60d0e4722ec67d34e7bd5c082606f52d4d004b
                                                            • Instruction ID: 292c6b2014f07d443717c47e4e14e83c39f1dad5ca6a574f8b649e34daa0f519
                                                            • Opcode Fuzzy Hash: 68ab6e620c1d441cfc297d121b60d0e4722ec67d34e7bd5c082606f52d4d004b
                                                            • Instruction Fuzzy Hash: C54182B4E012199FDB44DFA9D984AEEBBF2FF88310F10806AE915A7364DB356941CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f65404afbf94b164c03147d013d21fce7c91e3a8e352c6b267b1a84c7655cf57
                                                            • Instruction ID: 6cad856485d1bb9a02cb9081cad160ff4f404d812e13948890b902f2386c4af9
                                                            • Opcode Fuzzy Hash: f65404afbf94b164c03147d013d21fce7c91e3a8e352c6b267b1a84c7655cf57
                                                            • Instruction Fuzzy Hash: E211D671F002049BEB54CAA69D54BBEBBEADBC8350F04403AE906D7284DE74D91687A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b097a41b644f44fe1f42cdf0e7dbd4559044075109e59c774552acff09348644
                                                            • Instruction ID: 019e05ac6e657fe2b3a9fbfa966e307d91292f30f279ca53e6adb9d1b03fd26f
                                                            • Opcode Fuzzy Hash: b097a41b644f44fe1f42cdf0e7dbd4559044075109e59c774552acff09348644
                                                            • Instruction Fuzzy Hash: 5B018930B043503BE76A67B95C2477B6E5FEBC1320F0580A9EE048B381DF248C1182F9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ecb46a7ed355b92d5818b9a57611e2ed1876e6954fa1c8521449aa245944caa2
                                                            • Instruction ID: 9f0bcbd5a898cf7e7bbd2ae837ddf7172cda0614b72a7a5671e83eca6cf6ab06
                                                            • Opcode Fuzzy Hash: ecb46a7ed355b92d5818b9a57611e2ed1876e6954fa1c8521449aa245944caa2
                                                            • Instruction Fuzzy Hash: 9D11E332F042148FEB44DBEA9D507FE7BAADB88250F048026E946C72C4DA34DA1687A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ce01378037733eb7aa751f75924ba29da76e9150de9e1767d2233e422b7977c8
                                                            • Instruction ID: 43434cd6612d644d24cefd36270515cbce7954842c530351de2ee1456de44f75
                                                            • Opcode Fuzzy Hash: ce01378037733eb7aa751f75924ba29da76e9150de9e1767d2233e422b7977c8
                                                            • Instruction Fuzzy Hash: 450149267041982FE39956FD6C2033F6A9BDBD732078684AAD604CB391EE24A81183E1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e93c1ecbee2d910f41a4c648dfae71ecc7d5dd660be9b045dbaa1a9263e13cbf
                                                            • Instruction ID: 650ed6439181ea6888cb83171b768f912222a0540a55fc3a726cb07c8f3ebe07
                                                            • Opcode Fuzzy Hash: e93c1ecbee2d910f41a4c648dfae71ecc7d5dd660be9b045dbaa1a9263e13cbf
                                                            • Instruction Fuzzy Hash: 79216874D0121A9FDB04DFA8E8449EDBBB6FF88310F10812AE905B3250EB352A01CFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2374339510d38d953e399d4013e0259a5786697a0c38fc7175f10990566fc89a
                                                            • Instruction ID: c8c7fe429b8b0e019a655efaa84f6d56c1a7473fc54898e15a506f8c170339f0
                                                            • Opcode Fuzzy Hash: 2374339510d38d953e399d4013e0259a5786697a0c38fc7175f10990566fc89a
                                                            • Instruction Fuzzy Hash: 43116D34E01208DFEB48CFAAD9446DDBBB3EB89310F108029E904B7240DB355941CB64
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aafce6c755acd0ffb942ccad2bb2fe3e4a59cc60d42d36f4efff6ca5c826c93f
                                                            • Instruction ID: 8c84459c7a91e2d25c7aa2bfa003e54c367f2adf4ed245f2088960dee57d7fe4
                                                            • Opcode Fuzzy Hash: aafce6c755acd0ffb942ccad2bb2fe3e4a59cc60d42d36f4efff6ca5c826c93f
                                                            • Instruction Fuzzy Hash: D1014E35B0A3502BEB5557B91C6472FAF5ADFC6320F05447AE915C7381DD24CC01C2B5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0296fab6d5d5f5ea63df18d09991563998d7b65170e500b2196558952718c1c6
                                                            • Instruction ID: 58f4323ce16fd1b67e0971f8c52b68d6cb89b1198758cccc2bb7ba8d17d0b871
                                                            • Opcode Fuzzy Hash: 0296fab6d5d5f5ea63df18d09991563998d7b65170e500b2196558952718c1c6
                                                            • Instruction Fuzzy Hash: 95112C75E10218AFCB54DF69D88499EBBB6EF8D710B10812AE905A7360DB319941CBA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7a4870de1ded8779b5b4f44fccf47928546565624cf2abf8c9f9b8a4da5be64c
                                                            • Instruction ID: 91f56189fc599528d23e7b840df528e24816f3b173e251eb3171dcd186c68fd0
                                                            • Opcode Fuzzy Hash: 7a4870de1ded8779b5b4f44fccf47928546565624cf2abf8c9f9b8a4da5be64c
                                                            • Instruction Fuzzy Hash: 83114974E01208DFEB48CFAAD8446EDBBB3EB8D310F10902AE914B7350DB315941CB64
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5f976039ed3f3cd9d97258239598b53308f0f32c8d4bf057f8c040e4c9b38200
                                                            • Instruction ID: ef53ded41203020e03a6df15238145c26e4a3992b00da7de888c2e8a4db941a4
                                                            • Opcode Fuzzy Hash: 5f976039ed3f3cd9d97258239598b53308f0f32c8d4bf057f8c040e4c9b38200
                                                            • Instruction Fuzzy Hash: 652123B19002498EDB10CFAAC880BEEFBB0EB88324F10812ED459A7240C7746945CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6d153a505d31f2d7a587ce4dd4fc8570cb5c5ebeddd328d5180340b8531b6513
                                                            • Instruction ID: f267ba678893e0b22553c41612ed0970a9eb0a925da7dcfab6a0c8d939c64832
                                                            • Opcode Fuzzy Hash: 6d153a505d31f2d7a587ce4dd4fc8570cb5c5ebeddd328d5180340b8531b6513
                                                            • Instruction Fuzzy Hash: 1F11D374D0120A9BDF04DFA9D8459EDBBF6FF88310F10842AE905B3250EB356A45CFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e21e708e533153413eb38905da97cadb7491969f58a37f3e65e1ac50c980613e
                                                            • Instruction ID: 10cfe65499532c3b1069c9765cc59ed1136db0ffbf2beca3bc78bb0b769236dd
                                                            • Opcode Fuzzy Hash: e21e708e533153413eb38905da97cadb7491969f58a37f3e65e1ac50c980613e
                                                            • Instruction Fuzzy Hash: 49113335600145AFDB04DBA4D854BA97BB7FF8C325F544019E509E7390CF796896CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: da259667702da5fe7157c88512356c176f0e81c2c7f6c1c2c33f0658cf1a0725
                                                            • Instruction ID: 1ea2437d98c405bc7263666bb00ef6d39601d2482bbaefaa43e898b6dadf7425
                                                            • Opcode Fuzzy Hash: da259667702da5fe7157c88512356c176f0e81c2c7f6c1c2c33f0658cf1a0725
                                                            • Instruction Fuzzy Hash: 4011E0B5D042498BDB10DFAAC881BEEFBF4FB88324F10842AD459A7250C775A945CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 687639dfd52174aefc83107b8b23791db7a4967265f306f096519ee505133971
                                                            • Instruction ID: eb37b45f656c4655f5fff0334c2a9f4bc1bba3364d00ed4bd8dd6f0d662f7ead
                                                            • Opcode Fuzzy Hash: 687639dfd52174aefc83107b8b23791db7a4967265f306f096519ee505133971
                                                            • Instruction Fuzzy Hash: DC11D374E05209ABEB08CFAAE881ADEFBF6EF88300F01D02AE914A7254DB3455458F50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c12f12b8febd92ef335f8ebb966a679daed540044bb2fcd565c69937c2ae8df4
                                                            • Instruction ID: 1406c49f14cc3912834546389ccd9c2da959658e8d5cca4a42999d05fbd1c2bf
                                                            • Opcode Fuzzy Hash: c12f12b8febd92ef335f8ebb966a679daed540044bb2fcd565c69937c2ae8df4
                                                            • Instruction Fuzzy Hash: A7018F32A0010477F758AAA99C55BEF7AABDBC8300F25402DE106B33C0CEB55D0587F1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d33f6622d57472c1a3730d56bca926f5a1f285c485786b3f10706aee2133676f
                                                            • Instruction ID: ddfe722554e6603a15c6377e2074472c17ee931b90ca24aba4fffc19dcbcb085
                                                            • Opcode Fuzzy Hash: d33f6622d57472c1a3730d56bca926f5a1f285c485786b3f10706aee2133676f
                                                            • Instruction Fuzzy Hash: 2C112435600145AFDB04DFA4D854BA97BB7FF8C325F544019E509E7390CF79A896CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a5849bbff2fe7222b809e28bbcacea04442b01563e8b51637566e03989ab3751
                                                            • Instruction ID: 8bc7fa58240855ff738e0e02b932201a68968cb27ed49fbc81bd547b270edc76
                                                            • Opcode Fuzzy Hash: a5849bbff2fe7222b809e28bbcacea04442b01563e8b51637566e03989ab3751
                                                            • Instruction Fuzzy Hash: CD01D124B1D2D44BFBD8737A8DA433E1A9A8BC5714F044469C482C76C6DC949D4613E2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1727095166.000000000471D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0471D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_471d000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cadd48764919ef22ab6a4003c03b62e5aec321c7ccc432f1e68e2fccc77f0da4
                                                            • Instruction ID: 34d797dab72f703a10bf6a633c5a2e3ef0a03aa68d3a513c493595953407e502
                                                            • Opcode Fuzzy Hash: cadd48764919ef22ab6a4003c03b62e5aec321c7ccc432f1e68e2fccc77f0da4
                                                            • Instruction Fuzzy Hash: AE01F7715083409AE7208E2ED984767BF98DF41324F08C92AED480A356C279F841CAB1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0c4b0ee26b794eaf1c0f9d4472c4cd9be6d24c68fcd21e062217fd467d64ab66
                                                            • Instruction ID: 31a1707429d5690a1cbe114bac2c46f43802e04eed88443d27df50df362a49d6
                                                            • Opcode Fuzzy Hash: 0c4b0ee26b794eaf1c0f9d4472c4cd9be6d24c68fcd21e062217fd467d64ab66
                                                            • Instruction Fuzzy Hash: F701F234A0A3842FC7099F746C342663FEBEDC661874608ABD249CF1A1E918D44AC3E2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1727095166.000000000471D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0471D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_471d000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 59002a8155d90fabb2bc80e15efdeb3d94cfbe1f5d9d00b2315866a03c1f0448
                                                            • Instruction ID: b5d857e71e2a08ae61af62eae616bf3415ecb4001296844e9874e23f33cecfd6
                                                            • Opcode Fuzzy Hash: 59002a8155d90fabb2bc80e15efdeb3d94cfbe1f5d9d00b2315866a03c1f0448
                                                            • Instruction Fuzzy Hash: 9401527140D3C05ED7128B259894752BFB4DF43224F19C5CBD9888F2A3C2699849CB72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 51a1f3a83152f11f4cd9cb49284f8bcb25cd3daa345d96a85bfe7ab79c26aa8d
                                                            • Instruction ID: 95a68656684570e679aca940f20304d1695e5177d872ab8ab3ad8ea0ba2f8ceb
                                                            • Opcode Fuzzy Hash: 51a1f3a83152f11f4cd9cb49284f8bcb25cd3daa345d96a85bfe7ab79c26aa8d
                                                            • Instruction Fuzzy Hash: 3DF0A970E0A20DAFCF40CFE4EC01AEDBBB8EF45224F0000AAF908A3241D7351A01CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8530460417c25f090e4fb98107c0d68d2c3829faa23275e8c74d116e9f30b2c1
                                                            • Instruction ID: acd2eac19d61ccf089b5b7bfe1ae0c2e8716886a712a87af16173aabd447550f
                                                            • Opcode Fuzzy Hash: 8530460417c25f090e4fb98107c0d68d2c3829faa23275e8c74d116e9f30b2c1
                                                            • Instruction Fuzzy Hash: F2F0242074D3442FFBD553B16C2073A2BB6DBC1320F04846AE556CB2C6CC28980443B1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0bfc1ed36284be711ed4775dc28d85cb64371afa2f5c8fe6ac3ec9585ab687ed
                                                            • Instruction ID: 2682bbbfa3f7d9bceb47f08a640c9b24ab3680450160f8ef9c9d4daea8dd9e97
                                                            • Opcode Fuzzy Hash: 0bfc1ed36284be711ed4775dc28d85cb64371afa2f5c8fe6ac3ec9585ab687ed
                                                            • Instruction Fuzzy Hash: 02F08074B411051EDB4C9FB45D1576677DFFAC4628741082AD709CF1A0F924D45687D2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4224970d87dadbfda49248c11ff18ad059fa9a86a49e7d3c0b9206484856565d
                                                            • Instruction ID: bb97a0c962b8486be0b7c906ad85b2da001c7a37e80cf5157b12952348df01af
                                                            • Opcode Fuzzy Hash: 4224970d87dadbfda49248c11ff18ad059fa9a86a49e7d3c0b9206484856565d
                                                            • Instruction Fuzzy Hash: 5BE06832A822295AF3D422E63C243F72A4C8B81360F100477EA1CDA2D0CD4C89D082F0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e8198a2df1c676ac4d937000dc1c836433966261535627240f22c7f46ee9f634
                                                            • Instruction ID: aeadc53a0d80d4b9bb8ed25ab117e2e91958294625aa26ecdf57ae45124862c7
                                                            • Opcode Fuzzy Hash: e8198a2df1c676ac4d937000dc1c836433966261535627240f22c7f46ee9f634
                                                            • Instruction Fuzzy Hash: 71E06832D052196BE3912BE4AC147AB7E49DF91370F108025FE4D45291CE38C490D2F0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 490871f553580580f783d152c6669a582c4c6f70ff832d76906b7f0e7ba2d631
                                                            • Instruction ID: a95ad2ecd6545f27689be639cd571fd9947c0aa7e11e4cc88eb2c7fc5c04e81a
                                                            • Opcode Fuzzy Hash: 490871f553580580f783d152c6669a582c4c6f70ff832d76906b7f0e7ba2d631
                                                            • Instruction Fuzzy Hash: 95E0D834F2969542FBE462BBCD447AA14CD4B84758F000039C4C2826C6E5C0C94213F1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9fa5a9e47ffd4c23666c75fde92512c84c3f755ceaf788951f974536eede7084
                                                            • Instruction ID: 9f8c81d83009a53a32a172e04b7522a0198ac8fe07a82464d8179a7a416b1657
                                                            • Opcode Fuzzy Hash: 9fa5a9e47ffd4c23666c75fde92512c84c3f755ceaf788951f974536eede7084
                                                            • Instruction Fuzzy Hash: 4FD05B36A662147BD6442279287837BAA4CCB85220F509DA6EB15D7155DC14DC4102E4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 95a1d05664f2218964bed2b798cfa0f24fa28ce679def404d1e4a51f2c7576cf
                                                            • Instruction ID: 82c3cfb3db8b75246b91fa6877001a1ec89dc88320fd6f2d9b1782aaf33837ab
                                                            • Opcode Fuzzy Hash: 95a1d05664f2218964bed2b798cfa0f24fa28ce679def404d1e4a51f2c7576cf
                                                            • Instruction Fuzzy Hash: 11D02B3211D2543FC3061720AC518E67F7DD74B01030500A3F941C76A1CE600E04C7F1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8d1d6f84a85bff3d0aae43a040986bd6715303aba6f5481c921e4f0296a0c8ec
                                                            • Instruction ID: 83144df6f58f70e053b861878bc474ca2ee7d8a863a61172fd153cdd09c960ad
                                                            • Opcode Fuzzy Hash: 8d1d6f84a85bff3d0aae43a040986bd6715303aba6f5481c921e4f0296a0c8ec
                                                            • Instruction Fuzzy Hash: 05D0A7322540187B97847758DCC5A7ABBA9EB853603504477F90283264CD60AC5583E9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d6915b28b3b2a20844364717fbcb8f20f7c0bd29f2fc8b02ea60a66e52bb0487
                                                            • Instruction ID: 91092eb0534a7f526bb46a06404e97ab89ae9187f7e0a77fb05925ffc2a81446
                                                            • Opcode Fuzzy Hash: d6915b28b3b2a20844364717fbcb8f20f7c0bd29f2fc8b02ea60a66e52bb0487
                                                            • Instruction Fuzzy Hash: D8C01239E2222863DA5421B5780CBD77A8DC784520F5044A5EF19876419D78984113E4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e78867eb0cea35fc59b1af642236ab4a34096dbe62189bfb2c9be9c3b5f87b72
                                                            • Instruction ID: 4f8bafbe782b795f81392ee4edb38a225171357ae148d527dad2749fae791cb5
                                                            • Opcode Fuzzy Hash: e78867eb0cea35fc59b1af642236ab4a34096dbe62189bfb2c9be9c3b5f87b72
                                                            • Instruction Fuzzy Hash: 5AB012455450002676C0B7354CD07B68496D6C1300BC0CC5460039005C8D24C0042028
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000003.00000003.1726536773.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_3_6d00000_rundll32.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f186614e686a4ec48b7fe94e77256bbf229c49bf2f1c2b85a0d8ff979bbd246
                                                            • Instruction ID: 44b51f56712a90f4dde2a8b68b9a605f0e675e60a0d9ef38be7777ad0bcd0c62
                                                            • Opcode Fuzzy Hash: 2f186614e686a4ec48b7fe94e77256bbf229c49bf2f1c2b85a0d8ff979bbd246
                                                            • Instruction Fuzzy Hash: 52B0123400B1416FC601C720EE4DC8BFE5BAB903007454054F14100010C7340A70D7F1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%